Debian 9821 Published by

A node.js security update has been released for Debian GNU/Linux 10 to address multiple vulnerabilities that could result in DNS rebinding or arbitrary code execution.

DLA 3344-1: nodejs security update

Debian LTS Advisory DLA-3344-1 Guilhem Moulin
February 26, 2023

Package : nodejs
Version : 10.24.0~dfsg-1~deb10u3
CVE ID : CVE-2022-43548 CVE-2023-23920
Debian Bug : 1023518 1031834

Vulnerabilities have been found in Node.js, which could result in DNS
rebinding or arbitrary code execution.


The Node.js rebinding protector for `--inspect` still allows invalid
IP addresses, specifically in octal format, which browsers such as
Firefox attempt to resolve via DNS. When combined with an active
`--inspect` session, such as when using VSCode, an attacker can
perform DNS rebinding and execute arbitrary code.


Ben Noordhuis reported that Node.js would search and potentially
load ICU data when running with elevated privileges. Node.js now
builds with `ICU_NO_USER_DATA_OVERRIDE` to avoid this.

For Debian 10 buster, these problems have been fixed in version

We recommend that you upgrade your nodejs packages.

For the detailed security status of nodejs please refer to
its security tracker page at:

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: