[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RLSA-2022:6595 --- nodejs-nodemon

ID: oval:org.secpod.oval:def:5800103Date: (C)2023-04-03   (M)2024-04-17
Class: PATCHFamily: unix




Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs , nodejs-nodemon . Security Fix: * nodejs-ini: Prototype pollution via malicious INI file * nodejs-glob-parent: Regular expression denial of service * nodejs-ansi-regex: Regular expression denial of service matching ANSI escape codes * normalize-url: ReDoS for data URLs * nodejs: npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace * nodejs: DNS rebinding in --inspect via invalid IP addresses * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding * nodejs: HTTP request smuggling due to improper delimiting of header fields * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding * got: missing verification of requested URLs allows redirects to UNIX sockets For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * nodejs:16/nodejs: Rebase to the latest Nodejs 16 release [Rocky Linux-9] * nodejs: Specify --with-default-icu-data-dir when using bootstrap build

Platform:
Rocky Linux 9
Product:
nodejs-nodemon
Reference:
RLSA-2022:6595
CVE-2020-28469
CVE-2020-7788
CVE-2021-33502
CVE-2021-3807
CVE-2022-29244
CVE-2022-32212
CVE-2022-32213
CVE-2022-32214
CVE-2022-32215
CVE-2022-33987
CVE    10
CVE-2021-33502
CVE-2020-28469
CVE-2020-7788
CVE-2022-29244
...
CPE    1
cpe:/a:npmjs:nodejs-nodemon

© SecPod Technologies