[RLSA-2021:0548] nodejs:10 security update
An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.23.1).
Security Fix(es):
libuv: buffer overflow in realpath (CVE-2020-8252)
nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
nodejs-dot-prop: prototype pollution (CVE-2020-8116)
nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
npm: sensitive information exposure through logs (CVE-2020-15095)
nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)
nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.3 | < 17-3.module+el8.3.0+101+f84c7154 |
pkg:rpm/rockylinux/nodejs-nodemon?arch=noarch&distro=rockylinux-8.3 | < 1.18.3-1.module+el8.3.0+101+f84c7154 |
- ID
- RLSA-2021:0548
- Severity
- moderate
- URL
- https://errata.rockylinux.org/RLSA-2021:0548
- Published
-
2021-02-16T07:34:15
(3 years ago) - Modified
-
2023-02-02T13:15:37
(19 months ago) - Rights
- Copyright 2024 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALPINE:CVE-2020-7774
- ALPINE:CVE-2020-8252
- ALPINE:CVE-2020-8265
- ALPINE:CVE-2020-8287
- ALSA-2020:4272
- ALSA-2020:5499
- ALSA-2021:0548
- ALSA-2021:0549
- ALSA-2021:0551
- ALSA-2021:5171
- ALSA-2022:0350
- ALSA-2022:6595
- ASA-202101-16
- DSA-4826-1
- ELSA-2020-4272
- ELSA-2020-5499
- ELSA-2021-0548
- ELSA-2021-0549
- ELSA-2021-0551
- ELSA-2021-5171
- ELSA-2022-0350
- ELSA-2022-6595
- FEDORA-2020-43d5a372fc
- FEDORA-2021-d5b2c18fe6
- FEDORA-2021-fb1a136393
- FREEBSD:08B553ED-537A-11EB-BE6E-0022489AD614
- FREEBSD:4CA5894C-F7F1-11EA-8FF8-0022489AD614
- FREEBSD:C0C1834C-9761-11EB-ACFD-0022489AD614
- GLSA-202009-15
- GLSA-202101-07
- GLSA-202405-29
- NPM:GHSA-93F3-23RQ-PJFP
- NPM:GHSA-C4W7-XM78-47VH
- NPM:GHSA-FF7X-QRG7-QGGM
- NPM:GHSA-P9PC-299P-VXGP
- NPM:GHSA-PW54-MH39-W3HC
- NPM:GHSA-QQGX-2P2H-9C37
- NPM:GHSA-V88G-CGMW-V5XW
- openSUSE-SU-2020:1616-1
- openSUSE-SU-2020:1644-1
- openSUSE-SU-2020:1660-1
- openSUSE-SU-2021:0064-1
- openSUSE-SU-2021:0065-1
- openSUSE-SU-2021:0066-1
- openSUSE-SU-2021:0082-1
- openSUSE-SU-2021:0195-1
- openSUSE-SU-2021:1059-1
- openSUSE-SU-2021:1060-1
- openSUSE-SU-2021:1061-1
- openSUSE-SU-2021:1113-1
- openSUSE-SU-2021:2327-1
- openSUSE-SU-2021:2353-1
- openSUSE-SU-2021:2354-1
- openSUSE-SU-2021:2618-1
- RHSA-2020:4272
- RHSA-2020:5499
- RHSA-2021:0548
- RHSA-2021:0549
- RHSA-2021:0551
- RHSA-2021:5171
- RHSA-2022:0350
- RHSA-2022:6595
- RLSA-2020:4272
- RLSA-2020:5499
- RLSA-2021:0549
- RLSA-2021:0551
- RLSA-2021:5171
- RLSA-2022:0350
- SUSE-SU-2020:2800-1
- SUSE-SU-2020:2812-1
- SUSE-SU-2020:2813-1
- SUSE-SU-2020:2823-1
- SUSE-SU-2020:2829-1
- SUSE-SU-2020:2870-1
- SUSE-SU-2021:0060-1
- SUSE-SU-2021:0061-1
- SUSE-SU-2021:0062-1
- SUSE-SU-2021:0068-1
- SUSE-SU-2021:0082-1
- SUSE-SU-2021:0107-1
- SUSE-SU-2021:0121-1
- SUSE-SU-2021:0224-1
- SUSE-SU-2021:2319-1
- SUSE-SU-2021:2323-1
- SUSE-SU-2021:2326-1
- SUSE-SU-2021:2327-1
- SUSE-SU-2021:2353-1
- SUSE-SU-2021:2354-1
- SUSE-SU-2021:2618-1
- SUSE-SU-2021:2620-1
- USN-4548-1
- USN-5563-1
- USN-6380-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.3 | rockylinux | nodejs-packaging | < 17-3.module+el8.3.0+101+f84c7154 | rockylinux-8.3 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-nodemon?arch=noarch&distro=rockylinux-8.3 | rockylinux | nodejs-nodemon | < 1.18.3-1.module+el8.3.0+101+f84c7154 | rockylinux-8.3 | noarch |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |