[RHEA-2020:0330] nodejs:12 enhancement update
Severity
Low
Affected Packages
15
CVEs
3
The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)
- ID
- RHEA-2020:0330
- Severity
- low
- URL
- https://access.redhat.com/errata/RHEA-2020:0330
- Published
-
2020-02-04T00:00:00
(4 years ago) - Modified
-
2020-02-04T00:00:00
(4 years ago) - Rights
- Copyright 2020 Red Hat, Inc.
- Other Advisories
-
- ALEA-2020:0330
- ALSA-2020:0579
- ELSA-2020-0579
- FEDORA-2020-595ce5e3cc
- FREEBSD:2A3588B4-AB12-11EA-A051-001B217B3468
- GLSA-202003-48
- NPM:GHSA-4328-8HGF-7WJR
- NPM:GHSA-M6CX-G6QM-P2CX
- NPM:GHSA-X8QC-RRCW-4R46
- openSUSE-SU-2020:0059-1
- RHSA-2020:0579
- RLEA-2020:0330
- RLSA-2020:0579
- SUSE-SU-2020:0043-1
- SUSE-SU-2020:0063-1
- SUSE-SU-2020:0104-1
- SUSE-SU-2020:0247-1
- SUSE-SU-2020:0429-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1788301 | https://bugzilla.redhat.com/1788301 | |
Bugzilla | 1788305 | https://bugzilla.redhat.com/1788305 | |
Bugzilla | 1788310 | https://bugzilla.redhat.com/1788310 | |
RHSA | RHEA-2020:0330 | https://access.redhat.com/errata/RHEA-2020:0330 | |
CVE | CVE-2019-16775 | https://access.redhat.com/security/cve/CVE-2019-16775 | |
CVE | CVE-2019-16776 | https://access.redhat.com/security/cve/CVE-2019-16776 | |
CVE | CVE-2019-16777 | https://access.redhat.com/security/cve/CVE-2019-16777 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-8.1 | redhat | npm | < 6.13.4-1.12.14.1.1.module+el8.1.0+5466+30f75629 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/npm?arch=s390x&distro=redhat-8.1 | redhat | npm | < 6.13.4-1.12.14.1.1.module+el8.1.0+5466+30f75629 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-8.1 | redhat | npm | < 6.13.4-1.12.14.1.1.module+el8.1.0+5466+30f75629 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-8.1 | redhat | npm | < 6.13.4-1.12.14.1.1.module+el8.1.0+5466+30f75629 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-8.1 | redhat | nodejs | < 12.14.1-1.module+el8.1.0+5466+30f75629 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-8.1 | redhat | nodejs | < 12.14.1-1.module+el8.1.0+5466+30f75629 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-8.1 | redhat | nodejs | < 12.14.1-1.module+el8.1.0+5466+30f75629 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-8.1 | redhat | nodejs | < 12.14.1-1.module+el8.1.0+5466+30f75629 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/nodejs-packaging?distro=redhat-8.1 | redhat | nodejs-packaging | < 17-3.module+el8.1.0+3369+37ae6a45 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/nodejs-nodemon?distro=redhat-8.1 | redhat | nodejs-nodemon | < 1.18.3-1.module+el8.1.0+3369+37ae6a45 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/nodejs-docs?distro=redhat-8.1 | redhat | nodejs-docs | < 12.14.1-1.module+el8.1.0+5466+30f75629 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-8.1 | redhat | nodejs-devel | < 12.14.1-1.module+el8.1.0+5466+30f75629 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-8.1 | redhat | nodejs-devel | < 12.14.1-1.module+el8.1.0+5466+30f75629 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-8.1 | redhat | nodejs-devel | < 12.14.1-1.module+el8.1.0+5466+30f75629 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-8.1 | redhat | nodejs-devel | < 12.14.1-1.module+el8.1.0+5466+30f75629 | redhat-8.1 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |