[ALSA-2021:3666] Important: nodejs:14 security and bug fix update
Type:
security
Severity:
important
Release date:
2021-09-27
Description:
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930) * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940) * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) * nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931) * nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803) * nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804) * nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:14/nodejs: Make FIPS options always available (BZ#1993924)
Updated packages:
  • nodejs-nodemon-2.0.3-1.module_el8.4.0+2521+c668cc9f.noarch.rpm
  • nodejs-packaging-23-3.module_el8.4.0+2522+3bd42762.noarch.rpm
  • nodejs-nodemon-2.0.3-1.module_el8.5.0+85+79a7b441.noarch.rpm
  • nodejs-packaging-23-3.module_el8.5.0+254+b4526b16.noarch.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.