Headline
RHSA-2021:3281: Red Hat Security Advisory: rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon security update
An update for rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.5). Security Fix(es):
- nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)
- nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)
- nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
- nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
- c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
- nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)
- nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)
- nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)
- nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)
- nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Related CVEs:
- CVE-2020-7788: nodejs-ini: Prototype pollution via malicious INI file
- CVE-2020-28469: nodejs-glob-parent: Regular expression denial of service
- CVE-2021-3672: c-ares: Missing input validation of host names may lead to domain hijacking
- CVE-2021-22930: nodejs: Use-after-free on close http2 on stream canceling
- CVE-2021-22931: nodejs: Improper handling of untypical characters in domain names
- CVE-2021-22939: nodejs: Incomplete validation of tls rejectUnauthorized parameter
- CVE-2021-22940: nodejs: Use-after-free on close http2 on stream canceling
- CVE-2021-23343: nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
- CVE-2021-32803: nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite
- CVE-2021-32804: nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite