{"id":"ALSA-2021:3666","summary":"Important: nodejs:14 security and bug fix update","details":"Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:14/nodejs: Make FIPS options always available (BZ#1993924)","modified":"2026-01-30T01:18:05.521937Z","published":"2021-09-27T06:47:35Z","related":["CVE-2021-22930","CVE-2021-22931","CVE-2021-22939","CVE-2021-22940","CVE-2021-23343","CVE-2021-32803","CVE-2021-32804","CVE-2021-3672"],"references":[{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2021-3666.html"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-22930"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-22931"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-22939"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-22940"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-23343"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-32803"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-32804"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3672"}],"affected":[{"package":{"name":"nodejs-nodemon","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/nodejs-nodemon"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.3-1.module_el8.4.0+2521+c668cc9f"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2021:3666.json"}},{"package":{"name":"nodejs-packaging","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/nodejs-packaging"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"23-3.module_el8.5.0+254+b4526b16"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2021:3666.json"}},{"package":{"name":"nodejs-packaging","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/nodejs-packaging"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"23-3.module_el8.4.0+2522+3bd42762"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2021:3666.json"}}],"schema_version":"1.7.3"}