A nodejs:16 security update has been released for AlmaLinux 8.
ALSA-2023:4034 Important: nodejs:16 security update
Type:
security
Severity:
important
Release date:
2023-07-12
Description
Security Fix(es):
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
* c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
* c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)
* c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References:
CVE-2023-31124
CVE-2023-31130
CVE-2023-31147
CVE-2023-32067
RHSA-2023:4034
ALSA-2023:4034
Updates packages:
nodejs-devel-16.19.1-2.module_el8.8.0+3586+d4fc0b72.ppc64le.rpm
nodejs-devel-16.19.1-2.module_el8.8.0+3586+d4fc0b72.aarch64.rpm
npm-8.19.3-1.16.19.1.2.module_el8.8.0+3586+d4fc0b72.ppc64le.rpm
nodejs-16.19.1-2.module_el8.8.0+3586+d4fc0b72.x86_64.rpm
nodejs-docs-16.19.1-2.module_el8.8.0+3586+d4fc0b72.noarch.rpm
nodejs-16.19.1-2.module_el8.8.0+3586+d4fc0b72.ppc64le.rpm
nodejs-full-i18n-16.19.1-2.module_el8.8.0+3586+d4fc0b72.x86_64.rpm
Packages/nodejs-packaging-25-1.module_el8.5.0+2605+45d748af.noarch.rpm
nodejs-full-i18n-16.19.1-2.module_el8.8.0+3586+d4fc0b72.aarch64.rpm
nodejs-devel-16.19.1-2.module_el8.8.0+3586+d4fc0b72.s390x.rpm
npm-8.19.3-1.16.19.1.2.module_el8.8.0+3586+d4fc0b72.aarch64.rpm
nodejs-full-i18n-16.19.1-2.module_el8.8.0+3586+d4fc0b72.ppc64le.rpm
npm-8.19.3-1.16.19.1.2.module_el8.8.0+3586+d4fc0b72.x86_64.rpm
nodejs-devel-16.19.1-2.module_el8.8.0+3586+d4fc0b72.x86_64.rpm
nodejs-16.19.1-2.module_el8.8.0+3586+d4fc0b72.s390x.rpm
nodejs-16.19.1-2.module_el8.8.0+3586+d4fc0b72.aarch64.rpm
nodejs-full-i18n-16.19.1-2.module_el8.8.0+3586+d4fc0b72.s390x.rpm
nodejs-nodemon-2.0.20-3.module_el8.8.0+3586+d4fc0b72.noarch.rpm
npm-8.19.3-1.16.19.1.2.module_el8.8.0+3586+d4fc0b72.s390x.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.