Mageia 2022-0294: nodejs security update
Summary
The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an
installation even if dependency information in package-lock.json differsfrom package.json. This behavior is inconsistent with the documentation,
and makes it easier for attackers to install malware that was supposed to
have been blocked by an exact version match requirement in
package-lock.json. (CVE-2021-43616)
DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding
(CVE-2022-32213)
HTTP Request Smuggling - Improper Delimiting of Header Fields
(CVE-2022-32214)
HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding
(CVE-2022-32215)
Attempt to read openssl.cnf from /home/iojs/build/ upon startup
(CVE-2022-32222)
References
- https://bugs.mageia.org/show_bug.cgi?id=30078
- https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/
- https://github.com/nodejs/node/releases/tag/v14.19.0
- https://github.com/nodejs/node/releases/tag/v14.19.1
- https://github.com/nodejs/node/releases/tag/v14.19.2
- https://github.com/nodejs/node/releases/tag/v14.19.3
- https://github.com/nodejs/node/releases/tag/v14.20.0
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43616
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32222
Resolution
MGASA-2022-0294 - Updated nodejs packages fix security vulnerability
SRPMS
- 8/core/nodejs-14.20.0-1.1.mga8