9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.3 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.012 Low
EPSS
Percentile
85.3%
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.16.0), nodejs-nodemon (2.0.19). (BZ#2124230, BZ#2124233)
Security Fix(es):
nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
normalize-url: ReDoS for data URLs (CVE-2021-33502)
nodejs: npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace (CVE-2022-29244)
nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)
nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)
nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)
got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
nodejs:16/nodejs: Rebase to the latest Nodejs 16 release [Rocky Linux-9] (BZ#2121019)
nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2124299)
bugzilla.redhat.com/show_bug.cgi?id=1907444
bugzilla.redhat.com/show_bug.cgi?id=1945459
bugzilla.redhat.com/show_bug.cgi?id=1964461
bugzilla.redhat.com/show_bug.cgi?id=2007557
bugzilla.redhat.com/show_bug.cgi?id=2098556
bugzilla.redhat.com/show_bug.cgi?id=2102001
bugzilla.redhat.com/show_bug.cgi?id=2105422
bugzilla.redhat.com/show_bug.cgi?id=2105426
bugzilla.redhat.com/show_bug.cgi?id=2105428
bugzilla.redhat.com/show_bug.cgi?id=2105430
bugzilla.redhat.com/show_bug.cgi?id=2121019
bugzilla.redhat.com/show_bug.cgi?id=2124299
errata.rockylinux.org/RLSA-2022:6595
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.3 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.012 Low
EPSS
Percentile
85.3%