First published: Tue Jul 07 2020(Updated: )
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. <br>The following packages have been upgraded to a later upstream version: nodejs (12.18.2).<br>Security Fix(es):<br><li> nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)</li> <li> nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)</li> <li> nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)</li> <li> nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-nodemon | <1.18.3-1.module+el8.1.0+3369+37ae6a45 | 1.18.3-1.module+el8.1.0+3369+37ae6a45 |
redhat/nodejs-packaging | <17-3.module+el8.1.0+3369+37ae6a45 | 17-3.module+el8.1.0+3369+37ae6a45 |
redhat/nodejs-docs | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-nodemon | <1.18.3-1.module+el8.1.0+3369+37ae6a45 | 1.18.3-1.module+el8.1.0+3369+37ae6a45 |
redhat/nodejs-packaging | <17-3.module+el8.1.0+3369+37ae6a45 | 17-3.module+el8.1.0+3369+37ae6a45 |
redhat/nodejs | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-debuginfo | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-debugsource | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-devel | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-full-i18n | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/npm | <6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1 | 6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-debuginfo | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-debugsource | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-devel | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-full-i18n | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/npm | <6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1 | 6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-debuginfo | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-debugsource | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-devel | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs-full-i18n | <12.18.2-1.module+el8.2.0+7233+61d664c1 | 12.18.2-1.module+el8.2.0+7233+61d664c1 |
redhat/npm | <6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1 | 6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1 |
redhat/nodejs | <12.18.2-1.module+el8.2.0+7233+61d664c1.aa | 12.18.2-1.module+el8.2.0+7233+61d664c1.aa |
redhat/nodejs-debuginfo | <12.18.2-1.module+el8.2.0+7233+61d664c1.aa | 12.18.2-1.module+el8.2.0+7233+61d664c1.aa |
redhat/nodejs-debugsource | <12.18.2-1.module+el8.2.0+7233+61d664c1.aa | 12.18.2-1.module+el8.2.0+7233+61d664c1.aa |
redhat/nodejs-devel | <12.18.2-1.module+el8.2.0+7233+61d664c1.aa | 12.18.2-1.module+el8.2.0+7233+61d664c1.aa |
redhat/nodejs-full-i18n | <12.18.2-1.module+el8.2.0+7233+61d664c1.aa | 12.18.2-1.module+el8.2.0+7233+61d664c1.aa |
redhat/npm | <6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aa | 6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2852 is classified as important.
To fix RHSA-2020:2852, upgrade the affected nodejs packages to version 12.18.2-1.module+el8.2.0+7233+61d664c1.
The affected packages in RHSA-2020:2852 include nodejs, nodejs-nodemon, nodejs-docs, and npm among others.
Yes, to resolve RHSA-2020:2852, specific versions such as 12.18.2-1.module+el8.2.0+7233+61d664c1 for nodejs are required.
RHSA-2020:2852 addresses a security vulnerability related to nghttp2 that could allow an attacker to exploit the application.