The llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). References: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases
Created nodejs tracking bugs for this issue: Affects: epel-all [bug 2220789] Affects: fedora-all [bug 2220787] Created nodejs:14/nodejs tracking bugs for this issue: Affects: fedora-all [bug 2220786] Created nodejs:16-epel/nodejs tracking bugs for this issue: Affects: epel-all [bug 2220788] Created nodejs:16/nodejs tracking bugs for this issue: Affects: fedora-all [bug 2220785] Created nodejs:18/nodejs tracking bugs for this issue: Affects: fedora-all [bug 2220784]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:4331 https://access.redhat.com/errata/RHSA-2023:4331
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:4330 https://access.redhat.com/errata/RHSA-2023:4330
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:4536 https://access.redhat.com/errata/RHSA-2023:4536
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:4537 https://access.redhat.com/errata/RHSA-2023:4537
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-30589
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:5361 https://access.redhat.com/errata/RHSA-2023:5361
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:5533 https://access.redhat.com/errata/RHSA-2023:5533