Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2021:3281: Red Hat Security Advisory: rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon security update

An update for rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.5). Security Fix(es):

  • nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)
  • nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)
  • nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
  • nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
  • c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
  • nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)
  • nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)
  • nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)
  • nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)
  • nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Related CVEs:
  • CVE-2020-7788: nodejs-ini: Prototype pollution via malicious INI file
  • CVE-2020-28469: nodejs-glob-parent: Regular expression denial of service
  • CVE-2021-3672: c-ares: Missing input validation of host names may lead to domain hijacking
  • CVE-2021-22930: nodejs: Use-after-free on close http2 on stream canceling
  • CVE-2021-22931: nodejs: Improper handling of untypical characters in domain names
  • CVE-2021-22939: nodejs: Incomplete validation of tls rejectUnauthorized parameter
  • CVE-2021-22940: nodejs: Use-after-free on close http2 on stream canceling
  • CVE-2021-23343: nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
  • CVE-2021-32803: nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite
  • CVE-2021-32804: nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite
Red Hat Security Data
#vulnerability#red_hat#dos#nodejs#js#java

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update