RedHat: RHSA-2021-5171:03 Moderate: nodejs:16 security, bug fix,
Summary
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version:
nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching
ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests
(CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2020-7788 https://access.redhat.com/security/cve/CVE-2020-28469 https://access.redhat.com/security/cve/CVE-2021-3807 https://access.redhat.com/security/cve/CVE-2021-3918 https://access.redhat.com/security/cve/CVE-2021-22959 https://access.redhat.com/security/cve/CVE-2021-22960 https://access.redhat.com/security/cve/CVE-2021-33502 https://access.redhat.com/security/updates/classification/#moderate
Package List
Red Hat Enterprise Linux AppStream (v. 8):
Source:
nodejs-16.13.1-3.module+el8.5.0+13548+45d748af.src.rpm
nodejs-nodemon-2.0.15-1.module+el8.5.0+13548+45d748af.src.rpm
nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06.src.rpm
aarch64:
nodejs-16.13.1-3.module+el8.5.0+13548+45d748af.aarch64.rpm
nodejs-debuginfo-16.13.1-3.module+el8.5.0+13548+45d748af.aarch64.rpm
nodejs-debugsource-16.13.1-3.module+el8.5.0+13548+45d748af.aarch64.rpm
nodejs-devel-16.13.1-3.module+el8.5.0+13548+45d748af.aarch64.rpm
nodejs-full-i18n-16.13.1-3.module+el8.5.0+13548+45d748af.aarch64.rpm
npm-8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64.rpm
noarch:
nodejs-docs-16.13.1-3.module+el8.5.0+13548+45d748af.noarch.rpm
nodejs-nodemon-2.0.15-1.module+el8.5.0+13548+45d748af.noarch.rpm
nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06.noarch.rpm
ppc64le:
nodejs-16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le.rpm
nodejs-debuginfo-16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le.rpm
nodejs-debugsource-16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le.rpm
nodejs-devel-16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le.rpm
nodejs-full-i18n-16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le.rpm
npm-8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le.rpm
s390x:
nodejs-16.13.1-3.module+el8.5.0+13548+45d748af.s390x.rpm
nodejs-debuginfo-16.13.1-3.module+el8.5.0+13548+45d748af.s390x.rpm
nodejs-debugsource-16.13.1-3.module+el8.5.0+13548+45d748af.s390x.rpm
nodejs-devel-16.13.1-3.module+el8.5.0+13548+45d748af.s390x.rpm
nodejs-full-i18n-16.13.1-3.module+el8.5.0+13548+45d748af.s390x.rpm
npm-8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x.rpm
x86_64:
nodejs-16.13.1-3.module+el8.5.0+13548+45d748af.x86_64.rpm
nodejs-debuginfo-16.13.1-3.module+el8.5.0+13548+45d748af.x86_64.rpm
nodejs-debugsource-16.13.1-3.module+el8.5.0+13548+45d748af.x86_64.rpm
nodejs-devel-16.13.1-3.module+el8.5.0+13548+45d748af.x86_64.rpm
nodejs-full-i18n-16.13.1-3.module+el8.5.0+13548+45d748af.x86_64.rpm
npm-8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
![Dist Redhat](/images/distros/dist-redhat.png)
Topic
An update for the nodejs:16 module is now available for Red Hat EnterpriseLinux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
Bugs Fixed
1907444 - CVE-2020-7788 nodejs-ini: Prototype pollution via malicious INI file
1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service
1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs
2007557 - CVE-2021-3807 nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes
2014057 - CVE-2021-22959 llhttp: HTTP Request Smuggling due to spaces in headers2014059 - CVE-2021-22960 llhttp: HTTP Request Smuggling when parsing the body of chunked requests
2024702 - CVE-2021-3918 nodejs-json-schema: Prototype pollution vulnerability