rh-nodejs14-nodejs-nodemon-2.0.19-1.el7, rh-nodejs14-nodejs-14.20.0-2.el7
エラータID: AXSA:2022-3813:02
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.20.0).
Security Fix(es):
* nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
* nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)
* nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)
* nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)
* got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh-nodejs14-nodejs: rebase to latest upstream release
CVE-2022-32212
A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.16.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.
CVE-2022-32213
The llhttp parser in the http module in Node.js v17.x does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).
CVE-2022-32214
The llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
CVE-2022-32215
The llhttp parser in the http module in Node v17.6.0 does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
CVE-2022-33987
The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.
Update packages.
A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.16.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.
The llhttp parser in the http module in Node.js v17.x does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).
The llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
The llhttp parser in the http module in Node v17.6.0 does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.
N/A
SRPMS
- rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.src.rpm
MD5: e53c08c36a709f520e68b8141525b219
SHA-256: 4ebbbc1d6bfdb286bc0968a40d43296d4a98d2ac1a62bdf4925e45f1de489515
Size: 934.20 kB - rh-nodejs14-nodejs-14.20.0-2.el7.src.rpm
MD5: 84ff5b0e6fe5cc6906fd3861fbb0ab54
SHA-256: 9d4e99d392e91a2a7205a30572aaae90115d937d1bf344b55f2155f3a5fd38ba
Size: 44.32 MB
Asianux Server 7 for x86_64
- rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.noarch.rpm
MD5: 9200765e2c2508c500fef3a0c03b1963
SHA-256: c45f16e0f6195ab36647fd960d689152517b2b5044391b6df0a96e6de8818330
Size: 523.09 kB - rh-nodejs14-nodejs-14.20.0-2.el7.x86_64.rpm
MD5: c3d0ff077cd37d3c593861c3b3e9e85f
SHA-256: e430db537053199e5575d87b24d4005060a6f23fac70ffdcb055829e087ce89a
Size: 10.85 MB - rh-nodejs14-nodejs-devel-14.20.0-2.el7.x86_64.rpm
MD5: a861a6f51ca432ede48b2163152fc38a
SHA-256: af99bcbde4002a896f56d8a51e56aff98ece1612990f3549ad5f5e67f5a38694
Size: 236.22 kB - rh-nodejs14-nodejs-docs-14.20.0-2.el7.noarch.rpm
MD5: 3d1a5334eb50037d80c8602b69e699ec
SHA-256: d1cd39030334bd3f4b498cc2a92baf51a1eac44abbecffc37a136014e4bb3bad
Size: 4.45 MB - rh-nodejs14-npm-6.14.17-14.20.0.2.el7.x86_64.rpm
MD5: d0a3dcf429d550bae1b257ad3627c659
SHA-256: 5104746578356190b853f82d0180838366d2bf4cc803ed870f5a313a472c912e
Size: 4.08 MB