[RLSA-2019:2925] nodejs:10 security update
An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.16.3).
Security Fix(es):
HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.3 | < 17-3.module+el8.3.0+101+f84c7154 |
pkg:rpm/rockylinux/nodejs-nodemon?arch=noarch&distro=rockylinux-8.3 | < 1.18.3-1.module+el8.3.0+101+f84c7154 |
- ID
- RLSA-2019:2925
- Severity
- important
- URL
- https://errata.rockylinux.org/RLSA-2019:2925
- Published
-
2019-09-30T07:07:29
(5 years ago) - Modified
-
2023-02-02T12:57:17
(19 months ago) - Rights
- Copyright 2024 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALAS-2019-1270
- ALAS-2019-1298
- ALAS-2019-1299
- ALAS-2019-1311
- ALAS2-2019-1272
- ALAS2-2019-1298
- ALAS2-2019-1342
- ALPINE:CVE-2019-5737
- ALPINE:CVE-2019-9511
- ALPINE:CVE-2019-9512
- ALPINE:CVE-2019-9513
- ALPINE:CVE-2019-9514
- ALPINE:CVE-2019-9515
- ALPINE:CVE-2019-9516
- ALPINE:CVE-2019-9517
- ALPINE:CVE-2019-9518
- ALSA-2019:2799
- ALSA-2019:2925
- ALSA-2019:4269
- ALSA-2019:4273
- ASA-201908-12
- ASA-201908-13
- ASA-201908-15
- ASA-201908-17
- DSA-4503-1
- DSA-4505-1
- DSA-4508-1
- DSA-4509-1
- DSA-4511-1
- DSA-4520-1
- DSA-4669-1
- ELSA-2019-2692
- ELSA-2019-2726
- ELSA-2019-2799
- ELSA-2019-2893
- ELSA-2019-2925
- ELSA-2019-4269
- ELSA-2019-4273
- ELSA-2019-4816
- ELSA-2020-5859
- ELSA-2020-5862
- FEDORA-2019-34e097c66c
- FEDORA-2019-416d20f960
- FEDORA-2019-4427fd65be
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-63ba15cc83
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-7a0b45fdc4
- FEDORA-2019-81985a8858
- FEDORA-2019-8a437d5c2f
- FEDORA-2019-befd924cfe
- FEDORA-2019-e99c1603c3
- FEDORA-2020-47efc31973
- FEDORA-2020-830d8a1a92
- FEDORA-2021-d5b2c18fe6
- FREEBSD:121FEC01-C042-11E9-A73F-B36F5969F162
- FREEBSD:41F4BAAC-BF77-11E9-8D2F-5404A68AD561
- FREEBSD:72A5579E-C765-11E9-8052-0028F8D09152
- FREEBSD:73B1E734-C74E-11E9-8052-0028F8D09152
- FREEBSD:87679FCB-BE60-11E9-9051-4C72B94353B5
- FREEBSD:9FBAEFB3-837E-11EA-B5B4-641C67A117D8
- FREEBSD:B71D7193-3C54-11E9-A3F9-00155D006B02
- FREEBSD:C97A940B-C392-11E9-BB38-000D3AB229D6
- FREEBSD:CAF545F2-C0D9-11E9-9051-4C72B94353B5
- GLSA-201909-04
- GLSA-202003-48
- GO-2022-0536
- HTTPD:CVE-2019-9517
- MS:CVE-2019-5737
- MS:CVE-2019-9511
- MS:CVE-2019-9512
- MS:CVE-2019-9513
- MS:CVE-2019-9514
- MS:CVE-2019-9516
- MS:CVE-2019-9518
- NGINX:CVE-2019-9511
- NGINX:CVE-2019-9513
- NGINX:CVE-2019-9516
- openSUSE-SU-2019:2000-1
- openSUSE-SU-2019:2051-1
- openSUSE-SU-2019:2056-1
- openSUSE-SU-2019:2072-1
- openSUSE-SU-2019:2085-1
- openSUSE-SU-2019:2114-1
- openSUSE-SU-2019:2115-1
- openSUSE-SU-2019:2120-1
- openSUSE-SU-2019:2130-1
- openSUSE-SU-2019:2232-1
- openSUSE-SU-2019:2234-1
- openSUSE-SU-2019:2264-1
- RHSA-2019:2692
- RHSA-2019:2726
- RHSA-2019:2799
- RHSA-2019:2893
- RHSA-2019:2925
- RHSA-2019:4269
- RHSA-2019:4273
- RLSA-2019:2799
- RLSA-2019:4269
- RLSA-2019:4273
- SSA:2020-091-02
- SUSE-SU-2019:0627-1
- SUSE-SU-2019:0635-1
- SUSE-SU-2019:0636-1
- SUSE-SU-2019:0658-1
- SUSE-SU-2019:0818-1
- SUSE-SU-2019:2213-1
- SUSE-SU-2019:2214-1
- SUSE-SU-2019:2237-1
- SUSE-SU-2019:2254-1
- SUSE-SU-2019:2259-1
- SUSE-SU-2019:2260-1
- SUSE-SU-2019:2309-1
- SUSE-SU-2019:2329-1
- SUSE-SU-2019:2473-1
- SUSE-SU-2019:2559-1
- SUSE-SU-2020:0059-1
- SUSE-SU-2021:0932-1
- USN-4099-1
- USN-4113-1
- USN-4308-1
- USN-4796-1
- USN-4866-1
- USN-6754-1
- VU:605641
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.3 | rockylinux | nodejs-packaging | < 17-3.module+el8.3.0+101+f84c7154 | rockylinux-8.3 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-nodemon?arch=noarch&distro=rockylinux-8.3 | rockylinux | nodejs-nodemon | < 1.18.3-1.module+el8.3.0+101+f84c7154 | rockylinux-8.3 | noarch |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |