First published: Tue Sep 13 2022(Updated: )
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. <br>Security Fix(es):<br><li> nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)</li> <li> nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)</li> <li> nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)</li> <li> nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)</li> <li> got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> nodejs:14/nodejs: rebase to latest upstream release (BZ#2106367)</li> <li> nodejs:14/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111417)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-nodemon | <2.0.19-2.module+el8.6.0+16231+7c1b33d9 | 2.0.19-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-packaging | <23-3.module+el8.3.0+6519+9f98ed83 | 23-3.module+el8.3.0+6519+9f98ed83 |
redhat/nodejs | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-debuginfo | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-debugsource | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-devel | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-docs | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-full-i18n | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-nodemon | <2.0.19-2.module+el8.6.0+16231+7c1b33d9 | 2.0.19-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-packaging | <23-3.module+el8.3.0+6519+9f98ed83 | 23-3.module+el8.3.0+6519+9f98ed83 |
redhat/npm | <6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9 | 6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-debuginfo | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-debugsource | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-devel | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-full-i18n | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/npm | <6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9 | 6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-debuginfo | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-debugsource | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-devel | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs-full-i18n | <14.20.0-2.module+el8.6.0+16231+7c1b33d9 | 14.20.0-2.module+el8.6.0+16231+7c1b33d9 |
redhat/npm | <6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9 | 6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9 |
redhat/nodejs | <14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa | 14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa |
redhat/nodejs-debuginfo | <14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa | 14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa |
redhat/nodejs-debugsource | <14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa | 14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa |
redhat/nodejs-devel | <14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa | 14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa |
redhat/nodejs-full-i18n | <14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa | 14.20.0-2.module+el8.6.0+16231+7c1b33d9.aa |
redhat/npm | <6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9.aa | 6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2022:6448 addresses a DNS rebinding vulnerability and an HTTP request smuggling issue in Node.js.
Node.js versions prior to 14.20.0-2.module+el8.6.0+16231+7c1b33d9 are affected by RHSA-2022:6448.
To resolve the vulnerabilities in RHSA-2022:6448, upgrade to the patched version 14.20.0-2.module+el8.6.0+16231+7c1b33d9 or later.
Yes, the vulnerabilities mentioned in RHSA-2022:6448 can potentially be exploited if not patched.
Users of Node.js should upgrade to the latest recommended version as specified in RHSA-2022:6448 to mitigate security risks.