[RHSA-2021:0551] nodejs:14 security and bug fix update

Severity Moderate
Affected Packages 19
CVEs 7

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (14.15.4).

Security Fix(es):

  • nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)

  • nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)

  • nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)

  • nodejs: use-after-free in the TLS implementation (CVE-2020-8265)

  • c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)

  • nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)

  • nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • yarn install crashes with nodejs:14 on aarch64 (BZ#1916465)
Package Affected Version
pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-8.3 < 6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/npm?arch=s390x&distro=redhat-8.3 < 6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-8.3 < 6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-8.3 < 6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs-packaging?distro=redhat-8.3 < 23-3.module+el8.3.0+6519+9f98ed83
pkg:rpm/redhat/nodejs-nodemon?distro=redhat-8.3 < 2.0.3-1.module+el8.3.0+6519+9f98ed83
pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs-docs?distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-8.3 < 14.15.4-2.module+el8.3.0+9635+ffdf8381
ID
RHSA-2021:0551
Severity
moderate
URL
https://access.redhat.com/errata/RHSA-2021:0551
Published
2021-02-16T00:00:00
(3 years ago)
Modified
2021-02-16T00:00:00
(3 years ago)
Rights
Copyright 2021 Red Hat, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-8.3 redhat npm < 6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381 redhat-8.3 x86_64
Affected pkg:rpm/redhat/npm?arch=s390x&distro=redhat-8.3 redhat npm < 6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381 redhat-8.3 s390x
Affected pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-8.3 redhat npm < 6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381 redhat-8.3 ppc64le
Affected pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-8.3 redhat npm < 6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381 redhat-8.3 aarch64
Affected pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-8.3 redhat nodejs < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 x86_64
Affected pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-8.3 redhat nodejs < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 s390x
Affected pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-8.3 redhat nodejs < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 ppc64le
Affected pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-8.3 redhat nodejs < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 aarch64
Affected pkg:rpm/redhat/nodejs-packaging?distro=redhat-8.3 redhat nodejs-packaging < 23-3.module+el8.3.0+6519+9f98ed83 redhat-8.3
Affected pkg:rpm/redhat/nodejs-nodemon?distro=redhat-8.3 redhat nodejs-nodemon < 2.0.3-1.module+el8.3.0+6519+9f98ed83 redhat-8.3
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-8.3 redhat nodejs-full-i18n < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 x86_64
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-8.3 redhat nodejs-full-i18n < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 s390x
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-8.3 redhat nodejs-full-i18n < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 ppc64le
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-8.3 redhat nodejs-full-i18n < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 aarch64
Affected pkg:rpm/redhat/nodejs-docs?distro=redhat-8.3 redhat nodejs-docs < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3
Affected pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-8.3 redhat nodejs-devel < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 x86_64
Affected pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-8.3 redhat nodejs-devel < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 s390x
Affected pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-8.3 redhat nodejs-devel < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 ppc64le
Affected pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-8.3 redhat nodejs-devel < 14.15.4-2.module+el8.3.0+9635+ffdf8381 redhat-8.3 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...