[RLSA-2022:7830] nodejs:14 security update
An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RLSA-2022:7830
- Severity
- moderate
- URL
- https://errata.rockylinux.org/RLSA-2022:7830
- Published
-
2022-11-08T10:51:23
(22 months ago) - Modified
-
2023-02-02T13:53:48
(19 months ago) - Rights
- Copyright 2024 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALPINE:CVE-2021-44531
- ALPINE:CVE-2021-44532
- ALPINE:CVE-2021-44533
- ALPINE:CVE-2022-21824
- ALPINE:CVE-2022-35256
- ALSA-2022:6963
- ALSA-2022:6964
- ALSA-2022:7821
- ALSA-2022:7830
- ALSA-2022:9073
- ALSA-2023:0321
- DSA-5170-1
- DSA-5326-1
- ELSA-2022-6963
- ELSA-2022-6964
- ELSA-2022-7821
- ELSA-2022-7830
- ELSA-2023-0321
- FEDORA-2022-0eda327cb4
- FEDORA-2022-1667f7b60a
- FEDORA-2022-52dec6351a
- FEDORA-2022-78090d2099
- FEDORA-2022-de515f765f
- FREEBSD:8E150606-08C9-11ED-856E-D4C9EF517024
- FREEBSD:972BA0E8-8B8A-11EC-B369-6C3BE5272ACD
- GLSA-202405-29
- MS:CVE-2021-44531
- MS:CVE-2021-44532
- MS:CVE-2021-44533
- MS:CVE-2022-21824
- MS:CVE-2022-35256
- openSUSE-SU-2022:0112-1
- openSUSE-SU-2022:0113-1
- RHEA-2022:5139
- RHSA-2022:6963
- RHSA-2022:6964
- RHSA-2022:7821
- RHSA-2022:7830
- RHSA-2022:9073
- RHSA-2023:0321
- RLEA-2022:5139
- RLSA-2022:6964
- RLSA-2022:7821
- RLSA-2022:9073
- RLSA-2023:0321
- SUSE-SU-2022:0101-1
- SUSE-SU-2022:0112-1
- SUSE-SU-2022:0113-1
- SUSE-SU-2022:0114-1
- SUSE-SU-2022:0570-1
- SUSE-SU-2022:1717-1
- SUSE-SU-2022:3503-1
- SUSE-SU-2022:3516-1
- SUSE-SU-2022:3524-1
- SUSE-SU-2022:3614-1
- SUSE-SU-2022:3615-1
- SUSE-SU-2022:3616-1
- SUSE-SU-2022:3656-1
- SUSE-SU-2022:3835-1
- SUSE-SU-2023:0408-1
- SUSE-SU-2023:0419-1
- USN-6491-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-44531 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531 | |
CVE | CVE-2021-44532 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532 | |
CVE | CVE-2021-44533 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533 | |
CVE | CVE-2022-21824 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824 | |
CVE | CVE-2022-35256 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256 | |
Bugzilla | 2040839 | https://bugzilla.redhat.com/show_bug.cgi?id=2040839 | |
Bugzilla | 2040846 | https://bugzilla.redhat.com/show_bug.cgi?id=2040846 | |
Bugzilla | 2040856 | https://bugzilla.redhat.com/show_bug.cgi?id=2040856 | |
Bugzilla | 2040862 | https://bugzilla.redhat.com/show_bug.cgi?id=2040862 | |
Bugzilla | 2130518 | https://bugzilla.redhat.com/show_bug.cgi?id=2130518 | |
Self | RLSA-2022:7830 | https://errata.rockylinux.org/RLSA-2022:7830 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/npm?arch=x86_64&distro=rockylinux-8.7 | rockylinux | npm | < 6.14.17-1.14.20.1.2.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | x86_64 | |
Affected | pkg:rpm/rockylinux/npm?arch=aarch64&distro=rockylinux-8.7 | rockylinux | npm | < 6.14.17-1.14.20.1.2.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | aarch64 | |
Affected | pkg:rpm/rockylinux/nodejs?arch=x86_64&distro=rockylinux-8.7 | rockylinux | nodejs | < 14.20.1-2.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | x86_64 | |
Affected | pkg:rpm/rockylinux/nodejs?arch=aarch64&distro=rockylinux-8.7 | rockylinux | nodejs | < 14.20.1-2.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | aarch64 | |
Affected | pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.7 | rockylinux | nodejs-packaging | < 23-3.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-nodemon?arch=noarch&distro=rockylinux-8.6 | rockylinux | nodejs-nodemon | < 2.0.19-2.module+el8.6.0+1046+80feca58 | rockylinux-8.6 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-full-i18n?arch=x86_64&distro=rockylinux-8.7 | rockylinux | nodejs-full-i18n | < 14.20.1-2.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | x86_64 | |
Affected | pkg:rpm/rockylinux/nodejs-full-i18n?arch=aarch64&distro=rockylinux-8.7 | rockylinux | nodejs-full-i18n | < 14.20.1-2.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | aarch64 | |
Affected | pkg:rpm/rockylinux/nodejs-docs?arch=noarch&distro=rockylinux-8.7 | rockylinux | nodejs-docs | < 14.20.1-2.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-devel?arch=x86_64&distro=rockylinux-8.7 | rockylinux | nodejs-devel | < 14.20.1-2.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | x86_64 | |
Affected | pkg:rpm/rockylinux/nodejs-devel?arch=aarch64&distro=rockylinux-8.7 | rockylinux | nodejs-devel | < 14.20.1-2.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |