[ALSA-2021:5171] nodejs:16 security, bug fix, and enhancement update
An update for the nodejs:16 module is now available for AlmaLinux AlmaLinux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)
Security Fix(es):
nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
normalize-url: ReDoS for data URLs (CVE-2021-33502)
llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- ALSA-2021:5171
- Severity
- moderate
- URL
- https://errata.almalinux.org/ALSA-2021:5171.html
- Published
-
2021-12-15T19:09:29
(2 years ago) - Modified
-
2021-12-16T11:29:15
(2 years ago) - Rights
- Copyright 2021 AlmaLinux OS
- Other Advisories
-
- ALPINE:CVE-2021-22959
- ALPINE:CVE-2021-22960
- ALSA-2021:0548
- ALSA-2021:0549
- ALSA-2021:0551
- ALSA-2022:0350
- ALSA-2022:6595
- ASA-202110-4
- DSA-5170-1
- ELSA-2021-0548
- ELSA-2021-0549
- ELSA-2021-0551
- ELSA-2021-5171
- ELSA-2022-0350
- ELSA-2022-6449
- ELSA-2022-6595
- FEDORA-2021-9807b754d9
- FEDORA-2021-9818cabe0d
- FEDORA-2021-cbad295a90
- FREEBSD:A9C5E89D-2D15-11EC-8363-0022489AD614
- GLSA-202405-29
- NPM:GHSA-896R-F27R-55MW
- NPM:GHSA-93Q8-GQ69-WQMW
- NPM:GHSA-PX4H-XG32-Q955
- NPM:GHSA-QQGX-2P2H-9C37
- NPM:GHSA-WW39-953V-WCQ6
- openSUSE-SU-2021:1552-1
- openSUSE-SU-2021:1574-1
- openSUSE-SU-2021:3940-1
- openSUSE-SU-2021:3964-1
- openSUSE-SU-2022:0657-1
- openSUSE-SU-2022:0704-1
- openSUSE-SU-2022:0715-1
- RHEA-2022:5139
- RHSA-2021:0548
- RHSA-2021:0549
- RHSA-2021:0551
- RHSA-2021:5171
- RHSA-2022:0350
- RHSA-2022:6449
- RHSA-2022:6595
- RLEA-2022:5139
- RLSA-2021:0548
- RLSA-2021:0549
- RLSA-2021:0551
- RLSA-2021:5171
- RLSA-2022:0350
- RLSA-2022:6449
- SUSE-SU-2021:3886-1
- SUSE-SU-2021:3940-1
- SUSE-SU-2021:3964-1
- SUSE-SU-2022:0101-1
- SUSE-SU-2022:0531-1
- SUSE-SU-2022:0563-1
- SUSE-SU-2022:0569-1
- SUSE-SU-2022:0570-1
- SUSE-SU-2022:0657-1
- SUSE-SU-2022:0704-1
- SUSE-SU-2022:0715-1
- SUSE-SU-2022:1717-1
- SUSE-SU-2022:2855-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:0486-1
- SUSE-SU-2024:0487-1
- USN-6103-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2020-28469 | https://vulners.com/cve/CVE-2020-28469 | |
CVE | CVE-2020-7788 | https://vulners.com/cve/CVE-2020-7788 | |
CVE | CVE-2021-22959 | https://vulners.com/cve/CVE-2021-22959 | |
CVE | CVE-2021-22960 | https://vulners.com/cve/CVE-2021-22960 | |
CVE | CVE-2021-33502 | https://vulners.com/cve/CVE-2021-33502 | |
CVE | CVE-2021-3807 | https://vulners.com/cve/CVE-2021-3807 | |
CVE | CVE-2021-3918 | https://vulners.com/cve/CVE-2021-3918 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/almalinux/npm?arch=x86_64&distro=almalinux-8.5 | almalinux | npm | < 8.1.2-1.16.13.1.3.module_el8.5.0+2605+45d748af | almalinux-8.5 | x86_64 | |
Affected | pkg:rpm/almalinux/npm?arch=aarch64&distro=almalinux-8.5 | almalinux | npm | < 8.1.2-1.16.13.1.3.module_el8.5.0+2605+45d748af | almalinux-8.5 | aarch64 | |
Affected | pkg:rpm/almalinux/nodejs?arch=x86_64&distro=almalinux-8.5 | almalinux | nodejs | < 16.13.1-3.module_el8.5.0+2605+45d748af | almalinux-8.5 | x86_64 | |
Affected | pkg:rpm/almalinux/nodejs?arch=aarch64&distro=almalinux-8.5 | almalinux | nodejs | < 16.13.1-3.module_el8.5.0+2605+45d748af | almalinux-8.5 | aarch64 | |
Affected | pkg:rpm/almalinux/nodejs-packaging?arch=noarch&distro=almalinux-8.5 | almalinux | nodejs-packaging | < 25-1.module_el8.5.0+2605+45d748af | almalinux-8.5 | noarch | |
Affected | pkg:rpm/almalinux/nodejs-nodemon?arch=noarch&distro=almalinux-8.6 | almalinux | nodejs-nodemon | < 2.0.15-1.module_el8.6.0+2904+f21ad6f4 | almalinux-8.6 | noarch | |
Affected | pkg:rpm/almalinux/nodejs-nodemon?arch=noarch&distro=almalinux-8.5 | almalinux | nodejs-nodemon | < 2.0.15-1.module_el8.5.0+2605+45d748af | almalinux-8.5 | noarch | |
Affected | pkg:rpm/almalinux/nodejs-full-i18n?arch=x86_64&distro=almalinux-8.5 | almalinux | nodejs-full-i18n | < 16.13.1-3.module_el8.5.0+2605+45d748af | almalinux-8.5 | x86_64 | |
Affected | pkg:rpm/almalinux/nodejs-full-i18n?arch=aarch64&distro=almalinux-8.5 | almalinux | nodejs-full-i18n | < 16.13.1-3.module_el8.5.0+2605+45d748af | almalinux-8.5 | aarch64 | |
Affected | pkg:rpm/almalinux/nodejs-docs?arch=noarch&distro=almalinux-8.5 | almalinux | nodejs-docs | < 16.13.1-3.module_el8.5.0+2605+45d748af | almalinux-8.5 | noarch | |
Affected | pkg:rpm/almalinux/nodejs-devel?arch=x86_64&distro=almalinux-8.5 | almalinux | nodejs-devel | < 16.13.1-3.module_el8.5.0+2605+45d748af | almalinux-8.5 | x86_64 | |
Affected | pkg:rpm/almalinux/nodejs-devel?arch=aarch64&distro=almalinux-8.5 | almalinux | nodejs-devel | < 16.13.1-3.module_el8.5.0+2605+45d748af | almalinux-8.5 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |