Issued:
2021-09-22
Updated:
2021-09-22

RHSA-2021:3639 - Important: nodejs:12 security and bug fix update


Synopsis

Important: nodejs:12 security and bug fix update

Type/Severity

Security Advisory Important

Topic

An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (12.22.5). (BZ#1994941)

Security Fix(es):

  • nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)

  • nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)

  • c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)

  • nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)

  • nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)

  • nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290)

  • nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)

  • nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)

  • libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)

  • nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)

  • nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • nodejs:12/nodejs: Make FIPS options always available (BZ#1993929)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

ProductVersionArch
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions8.1x86_64
Red Hat Enterprise Linux for x86_64 - Extended Update Support8.1x86_64
Red Hat Enterprise Linux for Power, little endian - Extended Update Support8.1ppc64le
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support8.1s390x
Red Hat Enterprise Linux for ARM 64 - Extended Update Support8.1aarch64
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions8.1ppc64le

Updated Packages

  • nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45.noarch.rpm
  • nodejs-nodemon-1.18.3-1.module+el8.1.0+3369+37ae6a45.src.rpm
  • nodejs-nodemon-1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch.rpm
  • nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45.src.rpm
  • npm-6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le.rpm
  • nodejs-docs-12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch.rpm
  • nodejs-debuginfo-12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le.rpm
  • nodejs-devel-12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le.rpm
  • nodejs-debugsource-12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le.rpm
  • nodejs-12.22.5-1.module+el8.1.0+12238+63fe3aec.src.rpm
  • nodejs-full-i18n-12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le.rpm
  • nodejs-12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le.rpm
  • nodejs-debuginfo-12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64.rpm
  • nodejs-full-i18n-12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64.rpm
  • nodejs-12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64.rpm
  • nodejs-devel-12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64.rpm
  • npm-6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64.rpm
  • nodejs-debugsource-12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64.rpm
  • nodejs-debuginfo-12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64.rpm
  • npm-6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64.rpm
  • nodejs-full-i18n-12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64.rpm
  • nodejs-devel-12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64.rpm
  • nodejs-12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64.rpm
  • nodejs-debugsource-12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64.rpm
  • nodejs-devel-12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x.rpm
  • npm-6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x.rpm
  • nodejs-full-i18n-12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x.rpm
  • nodejs-12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x.rpm
  • nodejs-debuginfo-12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x.rpm
  • nodejs-debugsource-12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x.rpm

Fixes

CVEs

References


Additional information