rh-nodejs14-nodejs-nodemon-2.0.3-6.el7, rh-nodejs14-nodejs-14.18.2-1.el7

エラータID: AXSA:2022-2921:01

Release date: 
Friday, January 7, 2022 - 12:15
Subject: 
rh-nodejs14-nodejs-nodemon-2.0.3-6.el7, rh-nodejs14-nodejs-14.18.2-1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.18.2).

Security Fix(es):

* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* ll[http:](http:) HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* ll[http:](http:) HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-22959
The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.
CVE-2021-22960
The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.
CVE-2021-37701
The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.
CVE-2021-37712
The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.
CVE-2021-3807
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3918
json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. rh-nodejs14-nodejs-nodemon-2.0.3-6.el7.src.rpm
    MD5: e289dd07f521261e1c84aba685713ee6
    SHA-256: a978232b5bfbb706286ebb2e741406f600a1dd43bd9c009cf474d812dc503d26
    Size: 1.15 MB
  2. rh-nodejs14-nodejs-14.18.2-1.el7.src.rpm
    MD5: 564bb48e5b95a7ef4672038464e31179
    SHA-256: 754f65faaac0625452b2a05f0cb21fa7fa2de883707f678ce015714366a75ce3
    Size: 43.85 MB

Asianux Server 7 for x86_64
  1. rh-nodejs14-nodejs-nodemon-2.0.3-6.el7.noarch.rpm
    MD5: 64fa625d2f0a7432f08708ca52e744fa
    SHA-256: 7b41679e52e1242911ab8a59195cf768a49406f346823597127986a03a761d12
    Size: 818.54 kB
  2. rh-nodejs14-nodejs-14.18.2-1.el7.x86_64.rpm
    MD5: fa4177603719cad4b862b35da1d1752a
    SHA-256: eb74b89a53e5db8604c285b814138ec94cc016fd6472b6ee203cce364f7992cf
    Size: 10.82 MB
  3. rh-nodejs14-nodejs-devel-14.18.2-1.el7.x86_64.rpm
    MD5: ca8dea1aff18a4b447bfff3be821ba9c
    SHA-256: 321d24485f7f256d389f42991bf8bbc8db0b38288e20140295400b867e3e502b
    Size: 235.89 kB
  4. rh-nodejs14-nodejs-docs-14.18.2-1.el7.noarch.rpm
    MD5: c7c27ccd33014b83bb94b65442014d12
    SHA-256: 71b74773f68f166e5301f58e64525e1f28d9e24c754afc95ad63872b1a8a2d69
    Size: 4.43 MB
  5. rh-nodejs14-npm-6.14.15-14.18.2.1.el7.x86_64.rpm
    MD5: bd00f83dfea405bb1772fa7ad36f1e23
    SHA-256: 7f10516293b61b3b230a0bc22c3a288f6ebe11e59f59984495a32851a430715f
    Size: 4.10 MB