CVE-2023-46809 Affecting npm package, versions <1:10.2.4-1.20.11.1.1.module+el8.9.0+1776+addd4aec


Severity

Recommended
high

Based on Rocky Linux security rating.

Threat Intelligence

EPSS
0.32% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ROCKY8-NPM-6501582
  • published27 Mar 2024
  • disclosed7 Sept 2024

Introduced: 27 Mar 2024

CVE-2023-46809  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:8 npm to version 1:10.2.4-1.20.11.1.1.module+el8.9.0+1776+addd4aec or higher.
This issue was patched in RLSA-2024:1687.

NVD Description

Note: Versions mentioned in the description apply only to the upstream npm package and not the npm package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:8 relevant fixed versions and status.

Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.

CVSS Base Scores

version 3.1