MGASA-2022-0294

Source
https://advisories.mageia.org/MGASA-2022-0294.html
Import Source
https://advisories.mageia.org/MGASA-2022-0294.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0294
Related
Published
2022-08-25T21:21:07Z
Modified
2022-08-25T20:13:31Z
Summary
Updated nodejs packages fix security vulnerability
Details

The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. (CVE-2021-43616)

DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)

HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding (CVE-2022-32213)

HTTP Request Smuggling - Improper Delimiting of Header Fields (CVE-2022-32214)

HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (CVE-2022-32215)

Attempt to read openssl.cnf from /home/iojs/build/ upon startup (CVE-2022-32222)

References
Credits

Affected packages