MGASA-2022-0294

Source
https://advisories.mageia.org/MGASA-2022-0294.html
Import Source
https://advisories.mageia.org/MGASA-2022-0294.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0294
Related
Published
2022-08-25T21:21:07Z
Modified
2022-08-25T20:13:31Z
Summary
Updated nodejs packages fix security vulnerability
Details

The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. (CVE-2021-43616)

DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)

HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding (CVE-2022-32213)

HTTP Request Smuggling - Improper Delimiting of Header Fields (CVE-2022-32214)

HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (CVE-2022-32215)

Attempt to read openssl.cnf from /home/iojs/build/ upon startup (CVE-2022-32222)

References
Credits

Affected packages

Mageia:8 / nodejs

Package

Name
nodejs
Purl
pkg:rpm/mageia/nodejs?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
14.20.0-1.1.mga8

Ecosystem specific

{
    "section": "core"
}