Advisories ยป MGASA-2022-0294

Updated nodejs packages fix security vulnerability

Publication date: 25 Aug 2022
Modification date: 25 Aug 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-43616 , CVE-2022-32212 , CVE-2022-32213 , CVE-2022-32214 , CVE-2022-32215 , CVE-2022-32222

Description

The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an
installation even if dependency information in package-lock.json differs
from package.json. This behavior is inconsistent with the documentation,
and makes it easier for attackers to install malware that was supposed to
have been blocked by an exact version match requirement in
package-lock.json. (CVE-2021-43616)

DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)

HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding
(CVE-2022-32213)

HTTP Request Smuggling - Improper Delimiting of Header Fields
(CVE-2022-32214)

HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding
(CVE-2022-32215)

Attempt to read openssl.cnf from /home/iojs/build/ upon startup
(CVE-2022-32222)
                

References

SRPMS

8/core