Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:4039 - Security Advisory
Issued:
2023-07-12
Updated:
2023-07-12

RHSA-2023:4039 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: rh-nodejs14-nodejs security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for rh-nodejs14-nodejs is now available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

  • c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
  • c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
  • c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)
  • c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7 ppc64le
  • Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64

Fixes

  • BZ - 2209494 - CVE-2023-31124 c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation
  • BZ - 2209497 - CVE-2023-31130 c-ares: Buffer Underwrite in ares_inet_net_pton()
  • BZ - 2209501 - CVE-2023-31147 c-ares: Insufficient randomness in generation of DNS query IDs
  • BZ - 2209502 - CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service

CVEs

  • CVE-2023-31124
  • CVE-2023-31130
  • CVE-2023-31147
  • CVE-2023-32067

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7

SRPM
rh-nodejs14-nodejs-14.21.3-4.el7.src.rpm SHA-256: 246a1a64687dbf1bcf9cfa513a154aebd29bcde4b3895f80783f17c1c6b30c8f
x86_64
rh-nodejs14-nodejs-14.21.3-4.el7.x86_64.rpm SHA-256: cea865c4043db256ba7aa7ea9904aa97e1c90e2310f513d46fc314eac9220059
rh-nodejs14-nodejs-debuginfo-14.21.3-4.el7.x86_64.rpm SHA-256: 69602cd263f49f2b04946c91341c95ec0676cabcf52d60a7d5277cbed4198260
rh-nodejs14-nodejs-devel-14.21.3-4.el7.x86_64.rpm SHA-256: 8c68636e5ec378e21994e30d42367ebf982618b262ecb44c98d6006b15ad503a
rh-nodejs14-nodejs-docs-14.21.3-4.el7.noarch.rpm SHA-256: 2fdd6ee52631e08467fea2fd391ba17be10c097f330f084b544694bc61be5370
rh-nodejs14-nodejs-full-i18n-14.21.3-4.el7.x86_64.rpm SHA-256: c499ac4248c372bffe1be7ba06e57c552bf80d9d9460b364e2d2c17b18f91e3f
rh-nodejs14-npm-6.14.18-14.21.3.4.el7.x86_64.rpm SHA-256: c55d644c5111f0c35920199f71231b976fea1dc995e53399aff940466f9bf626

Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7

SRPM
rh-nodejs14-nodejs-14.21.3-4.el7.src.rpm SHA-256: 246a1a64687dbf1bcf9cfa513a154aebd29bcde4b3895f80783f17c1c6b30c8f
s390x
rh-nodejs14-nodejs-14.21.3-4.el7.s390x.rpm SHA-256: ce9bed05b19a2027a032c074ca63382b7c08e642e353b5cc2ae7c5365c1079fe
rh-nodejs14-nodejs-debuginfo-14.21.3-4.el7.s390x.rpm SHA-256: eaab494fea3de583dd972e5b32a34ff4261db216d8b710d1eb39c053e5b56d4f
rh-nodejs14-nodejs-devel-14.21.3-4.el7.s390x.rpm SHA-256: e9ac031245164d1c7a6c63f88391d22308ecb3ee7a91fdb7d4db8b0148dbd11c
rh-nodejs14-nodejs-docs-14.21.3-4.el7.noarch.rpm SHA-256: 2fdd6ee52631e08467fea2fd391ba17be10c097f330f084b544694bc61be5370
rh-nodejs14-nodejs-full-i18n-14.21.3-4.el7.s390x.rpm SHA-256: 8b91a46b5c6f535ea619437d7bdbfa0af7a16c9a27867b974c33cb5d81707c4c
rh-nodejs14-npm-6.14.18-14.21.3.4.el7.s390x.rpm SHA-256: 4eaa3670766d415f1830de53a6a69ff3bd917fa9418ab98610201c2ac4f4136f

Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7

SRPM
rh-nodejs14-nodejs-14.21.3-4.el7.src.rpm SHA-256: 246a1a64687dbf1bcf9cfa513a154aebd29bcde4b3895f80783f17c1c6b30c8f
ppc64le
rh-nodejs14-nodejs-14.21.3-4.el7.ppc64le.rpm SHA-256: 3e6ce6d68167dd7ca760bc15cd2ad8844403f6507eb5d0a08b7a1db039094b4d
rh-nodejs14-nodejs-debuginfo-14.21.3-4.el7.ppc64le.rpm SHA-256: 8e714537315ae607b98712caf8a240e864fed2d5bdf50f408d89e2b737081b9d
rh-nodejs14-nodejs-devel-14.21.3-4.el7.ppc64le.rpm SHA-256: d43d48565426e7fab5d1c792a4574efdd07845f2f6d4d48ffc9c04a2ac961369
rh-nodejs14-nodejs-docs-14.21.3-4.el7.noarch.rpm SHA-256: 2fdd6ee52631e08467fea2fd391ba17be10c097f330f084b544694bc61be5370
rh-nodejs14-nodejs-full-i18n-14.21.3-4.el7.ppc64le.rpm SHA-256: 7b4abf5798377a9ce436fe29e0a883bb908b98633ae5e200414dfd06730eb3ef
rh-nodejs14-npm-6.14.18-14.21.3.4.el7.ppc64le.rpm SHA-256: fc4b7099470a0b6ccb11eeed737a8dea02a304b22d9af01dc96e9092904c5097

Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7

SRPM
rh-nodejs14-nodejs-14.21.3-4.el7.src.rpm SHA-256: 246a1a64687dbf1bcf9cfa513a154aebd29bcde4b3895f80783f17c1c6b30c8f
x86_64
rh-nodejs14-nodejs-14.21.3-4.el7.x86_64.rpm SHA-256: cea865c4043db256ba7aa7ea9904aa97e1c90e2310f513d46fc314eac9220059
rh-nodejs14-nodejs-debuginfo-14.21.3-4.el7.x86_64.rpm SHA-256: 69602cd263f49f2b04946c91341c95ec0676cabcf52d60a7d5277cbed4198260
rh-nodejs14-nodejs-devel-14.21.3-4.el7.x86_64.rpm SHA-256: 8c68636e5ec378e21994e30d42367ebf982618b262ecb44c98d6006b15ad503a
rh-nodejs14-nodejs-docs-14.21.3-4.el7.noarch.rpm SHA-256: 2fdd6ee52631e08467fea2fd391ba17be10c097f330f084b544694bc61be5370
rh-nodejs14-nodejs-full-i18n-14.21.3-4.el7.x86_64.rpm SHA-256: c499ac4248c372bffe1be7ba06e57c552bf80d9d9460b364e2d2c17b18f91e3f
rh-nodejs14-npm-6.14.18-14.21.3.4.el7.x86_64.rpm SHA-256: c55d644c5111f0c35920199f71231b976fea1dc995e53399aff940466f9bf626

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility