The use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition. References: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases
Created nodejs tracking bugs for this issue: Affects: epel-all [bug 2219828] Affects: fedora-all [bug 2219826] Created nodejs:14/nodejs tracking bugs for this issue: Affects: fedora-all [bug 2219825] Created nodejs:16-epel/nodejs tracking bugs for this issue: Affects: epel-all [bug 2219827]
Created nodejs:16/nodejs tracking bugs for this issue: Affects: fedora-all [bug 2220686] Created nodejs:18/nodejs tracking bugs for this issue: Affects: fedora-all [bug 2220685]
Upstream fix: https://github.com/nodejs/node/commit/daaa43ed967626b997439f3c708aae0925f8d85a
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:4331 https://access.redhat.com/errata/RHSA-2023:4331
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:4330 https://access.redhat.com/errata/RHSA-2023:4330
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:4536 https://access.redhat.com/errata/RHSA-2023:4536
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:4537 https://access.redhat.com/errata/RHSA-2023:4537
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-30581
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:5361 https://access.redhat.com/errata/RHSA-2023:5361
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:5533 https://access.redhat.com/errata/RHSA-2023:5533