vulnerability

Amazon Linux 2023: CVE-2025-62408: Medium priority package update for nodejs20 (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Dec 8, 2025
Added
Jan 12, 2026
Modified
Jan 12, 2026

Description

c-ares is an asynchronous resolver library. Versions 1.32.3 through 1.34.5 terminate a query after maximum attempts when using read_answer() and process_answer(), which can cause a Denial of Service. This issue is fixed in version 1.34.6.
A flaw was found in c-ares. This vulnerability allows a Denial of Service (DoS) via terminating a query after maximum attempts when using `read_answer()` and `process_answer()` functions.

Solutions

amazon-linux-2023-upgrade-nodejs20amazon-linux-2023-upgrade-nodejs20-debuginfoamazon-linux-2023-upgrade-nodejs20-debugsourceamazon-linux-2023-upgrade-nodejs20-develamazon-linux-2023-upgrade-nodejs20-docsamazon-linux-2023-upgrade-nodejs20-full-i18namazon-linux-2023-upgrade-nodejs20-libsamazon-linux-2023-upgrade-nodejs20-libs-debuginfoamazon-linux-2023-upgrade-nodejs20-npmamazon-linux-2023-upgrade-nodejs22amazon-linux-2023-upgrade-nodejs22-debuginfoamazon-linux-2023-upgrade-nodejs22-debugsourceamazon-linux-2023-upgrade-nodejs22-develamazon-linux-2023-upgrade-nodejs22-docsamazon-linux-2023-upgrade-nodejs22-full-i18namazon-linux-2023-upgrade-nodejs22-libsamazon-linux-2023-upgrade-nodejs22-libs-debuginfoamazon-linux-2023-upgrade-nodejs22-npmamazon-linux-2023-upgrade-nodejs24amazon-linux-2023-upgrade-nodejs24-debuginfoamazon-linux-2023-upgrade-nodejs24-debugsourceamazon-linux-2023-upgrade-nodejs24-develamazon-linux-2023-upgrade-nodejs24-docsamazon-linux-2023-upgrade-nodejs24-full-i18namazon-linux-2023-upgrade-nodejs24-libsamazon-linux-2023-upgrade-nodejs24-libs-debuginfoamazon-linux-2023-upgrade-nodejs24-npmamazon-linux-2023-upgrade-v8-11-3-develamazon-linux-2023-upgrade-v8-12-4-develamazon-linux-2023-upgrade-v8-13-6-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.