Vulnerability Database
Blog
FAQ
Docs
RHSA-2023:1742
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2023:1742
Import Source
https://security.access.redhat.com/data/osv/RHSA-2023:1742.json
JSON Data
https://api.osv.dev/v1/vulns/RHSA-2023:1742
Related
CVE-2021-35065
CVE-2021-44531
CVE-2021-44532
CVE-2021-44533
CVE-2021-44906
CVE-2022-0235
CVE-2022-21824
CVE-2022-24999
CVE-2022-25881
CVE-2022-3517
CVE-2022-35256
CVE-2022-38900
CVE-2022-43548
CVE-2022-4904
CVE-2023-23918
CVE-2023-23920
Published
2024-10-22T00:34:46Z
Modified
2024-10-29T20:34:02Z
Severity
9.8 (Critical)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
Details
References
https://access.redhat.com/errata/RHSA-2023:1742
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2040839
https://bugzilla.redhat.com/show_bug.cgi?id=2040846
https://bugzilla.redhat.com/show_bug.cgi?id=2040856
https://bugzilla.redhat.com/show_bug.cgi?id=2040862
https://bugzilla.redhat.com/show_bug.cgi?id=2044591
https://bugzilla.redhat.com/show_bug.cgi?id=2066009
https://bugzilla.redhat.com/show_bug.cgi?id=2130518
https://bugzilla.redhat.com/show_bug.cgi?id=2134609
https://bugzilla.redhat.com/show_bug.cgi?id=2140911
https://bugzilla.redhat.com/show_bug.cgi?id=2142822
https://bugzilla.redhat.com/show_bug.cgi?id=2150323
https://bugzilla.redhat.com/show_bug.cgi?id=2156324
https://bugzilla.redhat.com/show_bug.cgi?id=2165824
https://bugzilla.redhat.com/show_bug.cgi?id=2168631
https://bugzilla.redhat.com/show_bug.cgi?id=2170644
https://bugzilla.redhat.com/show_bug.cgi?id=2171935
https://bugzilla.redhat.com/show_bug.cgi?id=2172217
https://bugzilla.redhat.com/show_bug.cgi?id=2175827
https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1742.json
https://access.redhat.com/security/cve/CVE-2021-35065
https://www.cve.org/CVERecord?id=CVE-2021-35065
https://nvd.nist.gov/vuln/detail/CVE-2021-35065
https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294
https://access.redhat.com/security/cve/CVE-2021-44531
https://www.cve.org/CVERecord?id=CVE-2021-44531
https://nvd.nist.gov/vuln/detail/CVE-2021-44531
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/
https://access.redhat.com/security/cve/CVE-2021-44532
https://www.cve.org/CVERecord?id=CVE-2021-44532
https://nvd.nist.gov/vuln/detail/CVE-2021-44532
https://access.redhat.com/security/cve/CVE-2021-44533
https://www.cve.org/CVERecord?id=CVE-2021-44533
https://nvd.nist.gov/vuln/detail/CVE-2021-44533
https://access.redhat.com/security/cve/CVE-2021-44906
https://www.cve.org/CVERecord?id=CVE-2021-44906
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://access.redhat.com/security/cve/CVE-2022-0235
https://www.cve.org/CVERecord?id=CVE-2022-0235
https://nvd.nist.gov/vuln/detail/CVE-2022-0235
https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/
https://access.redhat.com/security/cve/CVE-2022-3517
https://www.cve.org/CVERecord?id=CVE-2022-3517
https://nvd.nist.gov/vuln/detail/CVE-2022-3517
https://access.redhat.com/security/cve/CVE-2022-4904
https://www.cve.org/CVERecord?id=CVE-2022-4904
https://nvd.nist.gov/vuln/detail/CVE-2022-4904
https://github.com/c-ares/c-ares/issues/496
https://access.redhat.com/security/cve/CVE-2022-21824
https://www.cve.org/CVERecord?id=CVE-2022-21824
https://nvd.nist.gov/vuln/detail/CVE-2022-21824
https://access.redhat.com/security/cve/CVE-2022-24999
https://www.cve.org/CVERecord?id=CVE-2022-24999
https://nvd.nist.gov/vuln/detail/CVE-2022-24999
https://github.com/expressjs/express/releases/tag/4.17.3
https://github.com/ljharb/qs/pull/428
https://github.com/n8tz/CVE-2022-24999
https://access.redhat.com/security/cve/CVE-2022-25881
https://www.cve.org/CVERecord?id=CVE-2022-25881
https://nvd.nist.gov/vuln/detail/CVE-2022-25881
https://access.redhat.com/security/cve/CVE-2022-35256
https://www.cve.org/CVERecord?id=CVE-2022-35256
https://nvd.nist.gov/vuln/detail/CVE-2022-35256
https://nodejs.org/en/blog/vulnerability/september-2022-security-releases/#http-request-smuggling-due-to-incorrect-parsing-of-header-fields-medium-cve-2022-35256
https://access.redhat.com/security/cve/CVE-2022-38900
https://www.cve.org/CVERecord?id=CVE-2022-38900
https://nvd.nist.gov/vuln/detail/CVE-2022-38900
https://github.com/SamVerschueren/decode-uri-component/issues/5
https://github.com/advisories/GHSA-w573-4hg7-7wgq
https://access.redhat.com/security/cve/CVE-2022-43548
https://www.cve.org/CVERecord?id=CVE-2022-43548
https://nvd.nist.gov/vuln/detail/CVE-2022-43548
https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-octal-ip-address-medium-cve-2022-43548
https://access.redhat.com/security/cve/CVE-2023-23918
https://www.cve.org/CVERecord?id=CVE-2023-23918
https://nvd.nist.gov/vuln/detail/CVE-2023-23918
https://access.redhat.com/security/cve/CVE-2023-23920
https://www.cve.org/CVERecord?id=CVE-2023-23920
https://nvd.nist.gov/vuln/detail/CVE-2023-23920
Affected packages
Red Hat:rhel_eus:8.6::appstream
/
nodejs
Package
Name
nodejs
Purl
pkg:rpm/redhat/nodejs
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1:14.21.3-1.module+el8.6.0+18532+cbe6f646
Red Hat:rhel_eus:8.6::appstream
/
nodejs-debuginfo
Package
Name
nodejs-debuginfo
Purl
pkg:rpm/redhat/nodejs-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1:14.21.3-1.module+el8.6.0+18532+cbe6f646
Red Hat:rhel_eus:8.6::appstream
/
nodejs-debugsource
Package
Name
nodejs-debugsource
Purl
pkg:rpm/redhat/nodejs-debugsource
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1:14.21.3-1.module+el8.6.0+18532+cbe6f646
Red Hat:rhel_eus:8.6::appstream
/
nodejs-devel
Package
Name
nodejs-devel
Purl
pkg:rpm/redhat/nodejs-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1:14.21.3-1.module+el8.6.0+18532+cbe6f646
Red Hat:rhel_eus:8.6::appstream
/
nodejs-docs
Package
Name
nodejs-docs
Purl
pkg:rpm/redhat/nodejs-docs
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1:14.21.3-1.module+el8.6.0+18532+cbe6f646
Red Hat:rhel_eus:8.6::appstream
/
nodejs-full-i18n
Package
Name
nodejs-full-i18n
Purl
pkg:rpm/redhat/nodejs-full-i18n
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1:14.21.3-1.module+el8.6.0+18532+cbe6f646
Red Hat:rhel_eus:8.6::appstream
/
nodejs-nodemon
Package
Name
nodejs-nodemon
Purl
pkg:rpm/redhat/nodejs-nodemon
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:2.0.20-3.module+el8.6.0+18532+cbe6f646
Red Hat:rhel_eus:8.6::appstream
/
nodejs-packaging
Package
Name
nodejs-packaging
Purl
pkg:rpm/redhat/nodejs-packaging
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:23-3.module+el8.3.0+6519+9f98ed83
Red Hat:rhel_eus:8.6::appstream
/
npm
Package
Name
npm
Purl
pkg:rpm/redhat/npm
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1:6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646
RHSA-2023:1742 - OSV