First published: Mon Sep 30 2019(Updated: )
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.<br>The following packages have been upgraded to a later upstream version: nodejs (10.16.3).<br>Security Fix(es):<br><li> HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)</li> <li> HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)</li> <li> HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)</li> <li> HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)</li> <li> HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)</li> <li> HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)</li> <li> HTTP/2: request for large response leads to denial of service (CVE-2019-9517)</li> <li> HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-nodemon | <1.18.3-1.module+el8+2632+6c5111ed | 1.18.3-1.module+el8+2632+6c5111ed |
redhat/nodejs-packaging | <17-3.module+el8+2873+aa7dfd9a | 17-3.module+el8+2873+aa7dfd9a |
redhat/nodejs-docs | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-nodemon | <1.18.3-1.module+el8+2632+6c5111ed | 1.18.3-1.module+el8+2632+6c5111ed |
redhat/nodejs-packaging | <17-3.module+el8+2873+aa7dfd9a | 17-3.module+el8+2873+aa7dfd9a |
redhat/nodejs | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-debuginfo | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-debugsource | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-devel | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-devel-debuginfo | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/npm | <6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda | 6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda |
redhat/nodejs-debuginfo | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-debugsource | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-devel | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/npm | <6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda | 6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda |
redhat/nodejs | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-debuginfo | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-debugsource | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/nodejs-devel | <10.16.3-2.module+el8.0.0+4214+49953fda | 10.16.3-2.module+el8.0.0+4214+49953fda |
redhat/npm | <6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda | 6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda |
redhat/nodejs | <10.16.3-2.module+el8.0.0+4214+49953fda.aa | 10.16.3-2.module+el8.0.0+4214+49953fda.aa |
redhat/nodejs-debuginfo | <10.16.3-2.module+el8.0.0+4214+49953fda.aa | 10.16.3-2.module+el8.0.0+4214+49953fda.aa |
redhat/nodejs-debugsource | <10.16.3-2.module+el8.0.0+4214+49953fda.aa | 10.16.3-2.module+el8.0.0+4214+49953fda.aa |
redhat/nodejs-devel | <10.16.3-2.module+el8.0.0+4214+49953fda.aa | 10.16.3-2.module+el8.0.0+4214+49953fda.aa |
redhat/npm | <6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aa | 6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.