rpm package
almalinux/nodejs-nodemon
pkg:rpm/almalinux/nodejs-nodemon
Vulnerabilities (146)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-22025 | Med | 6.5 | < 3.0.1-1.module_el8.9.0+3731+490e3ce5 | 3.0.1-1.module_el8.9.0+3731+490e3ce5 | Mar 19, 2024 | A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch() function in Node.js always d | |
| CVE-2024-22017 | Hig | 7.3 | < 3.0.1-1.module_el8.9.0+3731+490e3ce5 | 3.0.1-1.module_el8.9.0+3731+490e3ce5 | Mar 19, 2024 | setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). This vulnerability affects all users us | |
| CVE-2024-25629 | — | < 3.0.1-1.module_el8.9.0+3731+490e3ce5 | 3.0.1-1.module_el8.9.0+3731+490e3ce5 | Feb 23, 2024 | c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these conf | ||
| CVE-2024-21896 | — | < 3.0.1-1.module_el8.9.0+3731+490e3ce5 | 3.0.1-1.module_el8.9.0+3731+490e3ce5 | Feb 20, 2024 | The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching B | ||
| CVE-2024-21890 | — | < 3.0.1-1.module_el8.9.0+3731+490e3ce5 | 3.0.1-1.module_el8.9.0+3731+490e3ce5 | Feb 20, 2024 | The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: ``` --allow-fs-read=/home/node/.ssh/*.pub ``` will ignore `pub` and give access to everything after `.ssh/`. This misleading | ||
| CVE-2024-21891 | — | < 3.0.1-1.module_el8.9.0+3731+490e3ce5 | 3.0.1-1.module_el8.9.0+3731+490e3ce5 | Feb 20, 2024 | Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users usi | ||
| CVE-2024-22019 | — | < 3.0.1-1.module_el8.8.0+3614+204d6f43 | 3.0.1-1.module_el8.8.0+3614+204d6f43 | Feb 20, 2024 | A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of li | ||
| CVE-2024-21892 | — | < 3.0.1-1.module_el9.2.0+36+853e48f5 | 3.0.1-1.module_el9.2.0+36+853e48f5 | Feb 20, 2024 | On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrec | ||
| CVE-2023-30590 | — | < 2.0.20-2.module_el9.2.0+29+de583a0b | 2.0.20-2.module_el9.2.0+29+de583a0b | Nov 28, 2023 | The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivat | ||
| CVE-2023-30588 | — | < 2.0.20-2.module_el9.2.0+29+de583a0b | 2.0.20-2.module_el9.2.0+29+de583a0b | Nov 28, 2023 | When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when acces | ||
| CVE-2023-30581 | — | < 2.0.20-2.module_el9.2.0+29+de583a0b | 2.0.20-2.module_el9.2.0+29+de583a0b | Nov 22, 2023 | The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. | ||
| CVE-2023-39331 | — | < 3.0.1-1.module_el8.9.0+3675+0258a6d9 | 3.0.1-1.module_el8.9.0+3675+0258a6d9 | Oct 18, 2023 | A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined impl | ||
| CVE-2023-38552 | — | < 3.0.1-1.module_el9.2.0+36+853e48f5 | 3.0.1-1.module_el9.2.0+36+853e48f5 | Oct 18, 2023 | When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability | ||
| CVE-2023-39332 | — | < 3.0.1-1.module_el8.9.0+3675+0258a6d9 | 3.0.1-1.module_el8.9.0+3675+0258a6d9 | Oct 18, 2023 | Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004) | ||
| CVE-2023-45143 | — | < 3.0.1-1.module_el9.2.0+36+853e48f5 | 3.0.1-1.module_el9.2.0+36+853e48f5 | Oct 12, 2023 | Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be se | ||
| CVE-2023-44487 | Hig | 7.5 | KEV | < 3.0.1-1.module_el9.2.0+36+853e48f5 | 3.0.1-1.module_el9.2.0+36+853e48f5 | Oct 10, 2023 | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
| CVE-2023-32559 | — | < 3.0.1-1.module_el8.8.0+3614+204d6f43 | 3.0.1-1.module_el8.8.0+3614+204d6f43 | Aug 24, 2023 | A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `pr | ||
| CVE-2023-32002 | — | < 3.0.1-1.module_el8.8.0+3614+204d6f43 | 3.0.1-1.module_el8.8.0+3614+204d6f43 | Aug 21, 2023 | The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note | ||
| CVE-2023-32006 | — | < 3.0.1-1.module_el8.8.0+3614+204d6f43 | 3.0.1-1.module_el8.8.0+3614+204d6f43 | Aug 15, 2023 | The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and | ||
| CVE-2023-30589 | — | < 2.0.20-2.module_el9.2.0+29+de583a0b | 2.0.20-2.module_el9.2.0+29+de583a0b | Jun 30, 2023 | The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RF |
- affected < 3.0.1-1.module_el8.9.0+3731+490e3ce5fixed 3.0.1-1.module_el8.9.0+3731+490e3ce5
A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch() function in Node.js always d
- affected < 3.0.1-1.module_el8.9.0+3731+490e3ce5fixed 3.0.1-1.module_el8.9.0+3731+490e3ce5
setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). This vulnerability affects all users us
- CVE-2024-25629Feb 23, 2024affected < 3.0.1-1.module_el8.9.0+3731+490e3ce5fixed 3.0.1-1.module_el8.9.0+3731+490e3ce5
c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these conf
- CVE-2024-21896Feb 20, 2024affected < 3.0.1-1.module_el8.9.0+3731+490e3ce5fixed 3.0.1-1.module_el8.9.0+3731+490e3ce5
The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching B
- CVE-2024-21890Feb 20, 2024affected < 3.0.1-1.module_el8.9.0+3731+490e3ce5fixed 3.0.1-1.module_el8.9.0+3731+490e3ce5
The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: ``` --allow-fs-read=/home/node/.ssh/*.pub ``` will ignore `pub` and give access to everything after `.ssh/`. This misleading
- CVE-2024-21891Feb 20, 2024affected < 3.0.1-1.module_el8.9.0+3731+490e3ce5fixed 3.0.1-1.module_el8.9.0+3731+490e3ce5
Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users usi
- CVE-2024-22019Feb 20, 2024affected < 3.0.1-1.module_el8.8.0+3614+204d6f43fixed 3.0.1-1.module_el8.8.0+3614+204d6f43
A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of li
- CVE-2024-21892Feb 20, 2024affected < 3.0.1-1.module_el9.2.0+36+853e48f5fixed 3.0.1-1.module_el9.2.0+36+853e48f5
On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrec
- CVE-2023-30590Nov 28, 2023affected < 2.0.20-2.module_el9.2.0+29+de583a0bfixed 2.0.20-2.module_el9.2.0+29+de583a0b
The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivat
- CVE-2023-30588Nov 28, 2023affected < 2.0.20-2.module_el9.2.0+29+de583a0bfixed 2.0.20-2.module_el9.2.0+29+de583a0b
When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when acces
- CVE-2023-30581Nov 22, 2023affected < 2.0.20-2.module_el9.2.0+29+de583a0bfixed 2.0.20-2.module_el9.2.0+29+de583a0b
The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20.
- CVE-2023-39331Oct 18, 2023affected < 3.0.1-1.module_el8.9.0+3675+0258a6d9fixed 3.0.1-1.module_el8.9.0+3675+0258a6d9
A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined impl
- CVE-2023-38552Oct 18, 2023affected < 3.0.1-1.module_el9.2.0+36+853e48f5fixed 3.0.1-1.module_el9.2.0+36+853e48f5
When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability
- CVE-2023-39332Oct 18, 2023affected < 3.0.1-1.module_el8.9.0+3675+0258a6d9fixed 3.0.1-1.module_el8.9.0+3675+0258a6d9
Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004)
- CVE-2023-45143Oct 12, 2023affected < 3.0.1-1.module_el9.2.0+36+853e48f5fixed 3.0.1-1.module_el9.2.0+36+853e48f5
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be se
- affected < 3.0.1-1.module_el9.2.0+36+853e48f5fixed 3.0.1-1.module_el9.2.0+36+853e48f5
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
- CVE-2023-32559Aug 24, 2023affected < 3.0.1-1.module_el8.8.0+3614+204d6f43fixed 3.0.1-1.module_el8.8.0+3614+204d6f43
A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `pr
- CVE-2023-32002Aug 21, 2023affected < 3.0.1-1.module_el8.8.0+3614+204d6f43fixed 3.0.1-1.module_el8.8.0+3614+204d6f43
The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note
- CVE-2023-32006Aug 15, 2023affected < 3.0.1-1.module_el8.8.0+3614+204d6f43fixed 3.0.1-1.module_el8.8.0+3614+204d6f43
The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and
- CVE-2023-30589Jun 30, 2023affected < 2.0.20-2.module_el9.2.0+29+de583a0bfixed 2.0.20-2.module_el9.2.0+29+de583a0b
The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RF
Page 3 of 8