[RLSA-2021:0548] nodejs:10 security update

Severity Moderate
Affected Packages 2
CVEs 10

An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (10.23.1).

Security Fix(es):

  • libuv: buffer overflow in realpath (CVE-2020-8252)

  • nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)

  • nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)

  • nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)

  • nodejs-dot-prop: prototype pollution (CVE-2020-8116)

  • nodejs: use-after-free in the TLS implementation (CVE-2020-8265)

  • npm: sensitive information exposure through logs (CVE-2020-15095)

  • nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)

  • nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)

  • nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Package Affected Version
pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.3 < 17-3.module+el8.3.0+101+f84c7154
pkg:rpm/rockylinux/nodejs-nodemon?arch=noarch&distro=rockylinux-8.3 < 1.18.3-1.module+el8.3.0+101+f84c7154
ID
RLSA-2021:0548
Severity
moderate
URL
https://errata.rockylinux.org/RLSA-2021:0548
Published
2021-02-16T07:34:15
(3 years ago)
Modified
2023-02-02T13:15:37
(19 months ago)
Rights
Copyright 2024 Rocky Enterprise Software Foundation
Other Advisories
Source # ID Name URL
CVE CVE-2020-15095 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095
CVE CVE-2020-15366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15366
CVE CVE-2020-7608 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608
CVE CVE-2020-7754 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7754
CVE CVE-2020-7774 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7774
CVE CVE-2020-7788 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
CVE CVE-2020-8116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116
CVE CVE-2020-8252 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252
CVE CVE-2020-8265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265
CVE CVE-2020-8287 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287
Bugzilla 1840004 https://bugzilla.redhat.com/show_bug.cgi?id=1840004
Bugzilla 1856875 https://bugzilla.redhat.com/show_bug.cgi?id=1856875
Bugzilla 1857977 https://bugzilla.redhat.com/show_bug.cgi?id=1857977
Bugzilla 1868196 https://bugzilla.redhat.com/show_bug.cgi?id=1868196
Bugzilla 1879315 https://bugzilla.redhat.com/show_bug.cgi?id=1879315
Bugzilla 1892430 https://bugzilla.redhat.com/show_bug.cgi?id=1892430
Bugzilla 1898680 https://bugzilla.redhat.com/show_bug.cgi?id=1898680
Bugzilla 1907444 https://bugzilla.redhat.com/show_bug.cgi?id=1907444
Bugzilla 1912854 https://bugzilla.redhat.com/show_bug.cgi?id=1912854
Bugzilla 1912863 https://bugzilla.redhat.com/show_bug.cgi?id=1912863
Self RLSA-2021:0548 https://errata.rockylinux.org/RLSA-2021:0548
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.3 rockylinux nodejs-packaging < 17-3.module+el8.3.0+101+f84c7154 rockylinux-8.3 noarch
Affected pkg:rpm/rockylinux/nodejs-nodemon?arch=noarch&distro=rockylinux-8.3 rockylinux nodejs-nodemon < 1.18.3-1.module+el8.3.0+101+f84c7154 rockylinux-8.3 noarch
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...