[RLEA-2022:5139] nodejs:12 bug fix and enhancement update
Severity
None
Affected Packages
12
CVEs
9
An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
- nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)
- ID
- RLEA-2022:5139
- Severity
- none
- URL
- https://errata.rockylinux.org/RLEA-2022:5139
- Published
-
2022-06-21T11:47:44
(2 years ago) - Modified
-
2023-02-02T13:44:05
(19 months ago) - Rights
- Copyright 2024 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALPINE:CVE-2021-22959
- ALPINE:CVE-2021-22960
- ALPINE:CVE-2021-37701
- ALPINE:CVE-2021-37712
- ALPINE:CVE-2021-44531
- ALPINE:CVE-2021-44532
- ALPINE:CVE-2021-44533
- ALPINE:CVE-2022-21824
- ALSA-2021:5171
- ALSA-2022:0350
- ALSA-2022:7830
- ALSA-2022:9073
- ASA-202110-4
- DSA-5008-1
- DSA-5170-1
- ELSA-2021-5171
- ELSA-2022-0350
- ELSA-2022-7830
- FEDORA-2021-9807b754d9
- FEDORA-2021-9818cabe0d
- FEDORA-2021-cbad295a90
- FEDORA-2022-0eda327cb4
- FEDORA-2022-78090d2099
- FREEBSD:7062BCE0-1B17-11EC-9D9D-0022489AD614
- FREEBSD:8E150606-08C9-11ED-856E-D4C9EF517024
- FREEBSD:972BA0E8-8B8A-11EC-B369-6C3BE5272ACD
- FREEBSD:A9C5E89D-2D15-11EC-8363-0022489AD614
- GLSA-202405-29
- MS:CVE-2021-44531
- MS:CVE-2021-44532
- MS:CVE-2021-44533
- MS:CVE-2022-21824
- NPM:GHSA-896R-F27R-55MW
- NPM:GHSA-9R2W-394V-53QC
- NPM:GHSA-QQ89-HQ3F-393P
- openSUSE-SU-2021:1552-1
- openSUSE-SU-2021:1574-1
- openSUSE-SU-2021:3940-1
- openSUSE-SU-2021:3964-1
- openSUSE-SU-2022:0112-1
- openSUSE-SU-2022:0113-1
- openSUSE-SU-2022:0657-1
- openSUSE-SU-2022:0704-1
- openSUSE-SU-2022:0715-1
- RHEA-2022:5139
- RHSA-2021:5171
- RHSA-2022:0350
- RHSA-2022:7830
- RHSA-2022:9073
- RLSA-2021:5171
- RLSA-2022:0350
- RLSA-2022:7830
- RLSA-2022:9073
- SUSE-SU-2021:3886-1
- SUSE-SU-2021:3940-1
- SUSE-SU-2021:3964-1
- SUSE-SU-2022:0101-1
- SUSE-SU-2022:0112-1
- SUSE-SU-2022:0113-1
- SUSE-SU-2022:0114-1
- SUSE-SU-2022:0531-1
- SUSE-SU-2022:0563-1
- SUSE-SU-2022:0569-1
- SUSE-SU-2022:0570-1
- SUSE-SU-2022:0657-1
- SUSE-SU-2022:0704-1
- SUSE-SU-2022:0715-1
- SUSE-SU-2022:1717-1
- SUSE-SU-2022:2855-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:0486-1
- SUSE-SU-2024:0487-1
- USN-6103-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-22959 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959 | |
CVE | CVE-2021-22960 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960 | |
CVE | CVE-2021-37701 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37701 | |
CVE | CVE-2021-37712 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37712 | |
CVE | CVE-2021-3918 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3918 | |
CVE | CVE-2021-44531 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531 | |
CVE | CVE-2021-44532 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532 | |
CVE | CVE-2021-44533 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533 | |
CVE | CVE-2022-21824 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824 | |
Bugzilla | 2084651 | https://bugzilla.redhat.com/show_bug.cgi?id=2084651 | |
Self | RLEA-2022:5139 | https://errata.rockylinux.org/RLEA-2022:5139 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/npm?arch=x86_64&distro=rockylinux-8.6 | rockylinux | npm | < 6.14.16-1.12.22.12.1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | x86_64 | |
Affected | pkg:rpm/rockylinux/npm?arch=aarch64&distro=rockylinux-8.6 | rockylinux | npm | < 6.14.16-1.12.22.12.1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | aarch64 | |
Affected | pkg:rpm/rockylinux/nodejs?arch=x86_64&distro=rockylinux-8.6 | rockylinux | nodejs | < 12.22.12-1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | x86_64 | |
Affected | pkg:rpm/rockylinux/nodejs?arch=aarch64&distro=rockylinux-8.6 | rockylinux | nodejs | < 12.22.12-1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | aarch64 | |
Affected | pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.6 | rockylinux | nodejs-packaging | < 17-3.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.3 | rockylinux | nodejs-packaging | < 17-3.module+el8.3.0+101+f84c7154 | rockylinux-8.3 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-nodemon?arch=noarch&distro=rockylinux-8.6 | rockylinux | nodejs-nodemon | < 2.0.3-1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-full-i18n?arch=x86_64&distro=rockylinux-8.6 | rockylinux | nodejs-full-i18n | < 12.22.12-1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | x86_64 | |
Affected | pkg:rpm/rockylinux/nodejs-full-i18n?arch=aarch64&distro=rockylinux-8.6 | rockylinux | nodejs-full-i18n | < 12.22.12-1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | aarch64 | |
Affected | pkg:rpm/rockylinux/nodejs-docs?arch=noarch&distro=rockylinux-8.6 | rockylinux | nodejs-docs | < 12.22.12-1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-devel?arch=x86_64&distro=rockylinux-8.6 | rockylinux | nodejs-devel | < 12.22.12-1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | x86_64 | |
Affected | pkg:rpm/rockylinux/nodejs-devel?arch=aarch64&distro=rockylinux-8.6 | rockylinux | nodejs-devel | < 12.22.12-1.module+el8.6.0+982+9fdca2d4 | rockylinux-8.6 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |