- Issued:
- 2022-10-18
- Updated:
- 2022-10-18
RHSA-2022:6985 - Moderate: nodejs:14 security and bug fix update
Synopsis
Moderate: nodejs:14 security and bug fix update
Type/Severity
Security Advisory Moderate
Topic
An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
-
nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
-
nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)
-
nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)
-
nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)
-
got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
nodejs:14/nodejs: rebase to latest upstream release (BZ#2106368)
-
nodejs:14/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111419)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 8.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 8.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension | 8.4 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 8.4 | ppc64le |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 8.4 | s390x |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 8.4 | aarch64 |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 8.4 | ppc64le |
| Red Hat Enterprise Linux Server - TUS | 8.4 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 8.4 | x86_64 |
Updated Packages
- nodejs-nodemon-2.0.19-2.module+el8.4.0+16234+70f4adc8.noarch.rpm
- nodejs-14.20.0-2.module+el8.4.0+16234+70f4adc8.src.rpm
- nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm
- nodejs-14.20.0-2.module+el8.4.0+16234+70f4adc8.aarch64.rpm
- nodejs-nodemon-2.0.19-2.module+el8.4.0+16234+70f4adc8.src.rpm
- nodejs-docs-14.20.0-2.module+el8.4.0+16234+70f4adc8.noarch.rpm
- nodejs-debugsource-14.20.0-2.module+el8.4.0+16234+70f4adc8.aarch64.rpm
- npm-6.14.17-1.14.20.0.2.module+el8.4.0+16234+70f4adc8.aarch64.rpm
- nodejs-devel-14.20.0-2.module+el8.4.0+16234+70f4adc8.aarch64.rpm
- nodejs-debuginfo-14.20.0-2.module+el8.4.0+16234+70f4adc8.aarch64.rpm
- nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm
- nodejs-full-i18n-14.20.0-2.module+el8.4.0+16234+70f4adc8.aarch64.rpm
- nodejs-full-i18n-14.20.0-2.module+el8.4.0+16234+70f4adc8.ppc64le.rpm
- nodejs-debuginfo-14.20.0-2.module+el8.4.0+16234+70f4adc8.ppc64le.rpm
- nodejs-debugsource-14.20.0-2.module+el8.4.0+16234+70f4adc8.ppc64le.rpm
- nodejs-devel-14.20.0-2.module+el8.4.0+16234+70f4adc8.ppc64le.rpm
- npm-6.14.17-1.14.20.0.2.module+el8.4.0+16234+70f4adc8.ppc64le.rpm
- nodejs-14.20.0-2.module+el8.4.0+16234+70f4adc8.ppc64le.rpm
- nodejs-devel-14.20.0-2.module+el8.4.0+16234+70f4adc8.x86_64.rpm
- nodejs-14.20.0-2.module+el8.4.0+16234+70f4adc8.x86_64.rpm
- nodejs-debuginfo-14.20.0-2.module+el8.4.0+16234+70f4adc8.x86_64.rpm
- nodejs-full-i18n-14.20.0-2.module+el8.4.0+16234+70f4adc8.x86_64.rpm
- npm-6.14.17-1.14.20.0.2.module+el8.4.0+16234+70f4adc8.x86_64.rpm
- nodejs-debugsource-14.20.0-2.module+el8.4.0+16234+70f4adc8.x86_64.rpm
- nodejs-debuginfo-14.20.0-2.module+el8.4.0+16234+70f4adc8.s390x.rpm
- nodejs-devel-14.20.0-2.module+el8.4.0+16234+70f4adc8.s390x.rpm
- nodejs-full-i18n-14.20.0-2.module+el8.4.0+16234+70f4adc8.s390x.rpm
- nodejs-debugsource-14.20.0-2.module+el8.4.0+16234+70f4adc8.s390x.rpm
- nodejs-14.20.0-2.module+el8.4.0+16234+70f4adc8.s390x.rpm
- npm-6.14.17-1.14.20.0.2.module+el8.4.0+16234+70f4adc8.s390x.rpm
Fixes
- This content is not included.BZ - 2102001
- This content is not included.BZ - 2105422
- This content is not included.BZ - 2105426
- This content is not included.BZ - 2105428
- This content is not included.BZ - 2105430
- This content is not included.BZ - 2106368
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.