QID 243178
Date Published: 2024-04-11
QID 243178: Red Hat Update for nodejs:20 (RHSA-2024:1688)
Node.js is a software development platform for building fast and scalable.network applications in the javascript programming language...Security Fix(es):
- nodejs: vulnerable to timing variant of the bleichenbacher attack against pkcs#1 v1.5 padding (marvin) (cve-2023-46809).
Nodejs: reading unprocessed http request with unbounded chunk extension allows dos attacks (cve-2024-22019).
Nodejs: code injection and privilege escalation through linux capabilities (cve-2024-21892).
Nodejs: path traversal by monkey-patching buffer internals (cve-2024-21896).
Nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization (cve-2024-21891).
Nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write (cve-2024-21890).
Nodejs: setuid() does not drop all privileges due to io_uring (cve-2024-22017).
- Red Hat enterprise linux for x86_64 9 x86_64.
Red hat enterprise linux for ibm z systems 9 s390x.
Red hat enterprise linux for power, little endian 9 ppc64le.
Red hat enterprise linux for arm 64 9 aarch64.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
Solution
Refer to Red Hat security advisory RHSA-2024:1688 for updates and patch information.
Vendor References
- RHSA-2024:1688 -
access.redhat.com/errata/RHSA-2024:1688
CVEs related to QID 243178
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| RHSA-2024:1688 | Red Hat Enterprise Linux |
|