{"schema_version": "1.3.1", "id": "RLSA-2024:1503", "modified": "2024-03-27T04:36:49.069892Z", "published": "2024-03-27T04:35:34.963860Z", "related": ["CVE-2023-46809", "CVE-2024-21892", "CVE-2024-22019"], "summary": "Important: nodejs:18 security update", "details": "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nSecurity Fix(es):\n\n* nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892)\n\n* nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)\n\n* nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "nodejs-nodemon", "purl": "pkg:rpm/rocky-linux/nodejs-nodemon?distro=rocky-linux-9-x86-64&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:3.0.1-1.module+el9.2.0+15226+de336927"}], "database_specific": {"yum_repository": "AppStream"}}]}, {"package": {"ecosystem": "Rocky Linux:9", "name": "nodejs-packaging", "purl": "pkg:rpm/rocky-linux/nodejs-packaging?distro=rocky-linux-9-x86-64&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:2021.06-4.module+el9.2.0+15226+de336927"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2024:1503"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}