Bug 2219842 (CVE-2023-30590) - CVE-2023-30590 nodejs: DiffieHellman do not generate keys after setting a private key
Summary: CVE-2023-30590 nodejs: DiffieHellman do not generate keys after setting a pri...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2023-30590
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2220790 2220791 2220792 2220793 2220794 2220795 2220802 2220803 2220804 2220805 2220806 2220807 2223319 2223342 2223343 2223635 2223653 2223686 2223687
Blocks: 2217661
TreeView+ depends on / blocked
 
Reported: 2023-07-05 15:05 UTC by Dhananjay Arunesh
Modified: 2023-12-10 17:44 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.
Clone Of:
Environment:
Last Closed: 2023-08-08 13:18:01 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:4330 0 None None None 2023-07-31 09:32:41 UTC
Red Hat Product Errata RHSA-2023:4331 0 None None None 2023-07-31 09:32:32 UTC
Red Hat Product Errata RHSA-2023:4536 0 None None None 2023-08-08 08:37:59 UTC
Red Hat Product Errata RHSA-2023:4537 0 None None None 2023-08-08 08:38:04 UTC
Red Hat Product Errata RHSA-2023:5361 0 None None None 2023-09-26 14:50:40 UTC
Red Hat Product Errata RHSA-2023:5533 0 None None None 2023-10-09 10:26:49 UTC

Description Dhananjay Arunesh 2023-07-05 15:05:07 UTC
The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.

References:
https://nodejs.org/en/blog/vulnerability/june-2023-security-releases

Comment 1 Dhananjay Arunesh 2023-07-06 05:32:21 UTC
Created nodejs tracking bugs for this issue:

Affects: epel-all [bug 2220795]
Affects: fedora-all [bug 2220793]


Created nodejs:14/nodejs tracking bugs for this issue:

Affects: fedora-all [bug 2220792]


Created nodejs:16-epel/nodejs tracking bugs for this issue:

Affects: epel-all [bug 2220794]


Created nodejs:16/nodejs tracking bugs for this issue:

Affects: fedora-all [bug 2220791]


Created nodejs:18/nodejs tracking bugs for this issue:

Affects: fedora-all [bug 2220790]

Comment 4 errata-xmlrpc 2023-07-31 09:32:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:4331 https://access.redhat.com/errata/RHSA-2023:4331

Comment 5 errata-xmlrpc 2023-07-31 09:32:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:4330 https://access.redhat.com/errata/RHSA-2023:4330

Comment 6 errata-xmlrpc 2023-08-08 08:37:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4536 https://access.redhat.com/errata/RHSA-2023:4536

Comment 7 errata-xmlrpc 2023-08-08 08:38:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4537 https://access.redhat.com/errata/RHSA-2023:4537

Comment 8 Product Security DevOps Team 2023-08-08 13:18:00 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-30590

Comment 9 errata-xmlrpc 2023-09-26 14:50:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:5361 https://access.redhat.com/errata/RHSA-2023:5361

Comment 10 errata-xmlrpc 2023-10-09 10:26:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:5533 https://access.redhat.com/errata/RHSA-2023:5533


Note You need to log in before you can comment on or make changes to this bug.