First published: Tue Jul 21 2020(Updated: )
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. <br>The following packages have been upgraded to a later upstream version: nodejs (10.21.0).<br>Security Fix(es):<br><li> nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)</li> <li> nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)</li> <li> nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-nodemon | <1.18.3-1.module+el8+2632+6c5111ed | 1.18.3-1.module+el8+2632+6c5111ed |
redhat/nodejs-packaging | <17-3.module+el8+2873+aa7dfd9a | 17-3.module+el8+2873+aa7dfd9a |
redhat/nodejs-docs | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-nodemon | <1.18.3-1.module+el8+2632+6c5111ed | 1.18.3-1.module+el8+2632+6c5111ed |
redhat/nodejs-packaging | <17-3.module+el8+2873+aa7dfd9a | 17-3.module+el8+2873+aa7dfd9a |
redhat/nodejs | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-debuginfo | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-debugsource | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-devel | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-full-i18n | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/npm | <6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1 | 6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1 |
redhat/nodejs | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-debuginfo | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-debugsource | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-devel | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/nodejs-full-i18n | <10.21.0-3.module+el8.0.0+7067+054302d1 | 10.21.0-3.module+el8.0.0+7067+054302d1 |
redhat/npm | <6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1 | 6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:3042 is classified as a moderate security vulnerability.
To fix RHSA-2020:3042, upgrade the affected packages to the latest versions specified in the advisory.
The affected packages in RHSA-2020:3042 include nodejs, nodejs-nodemon, nodejs-packaging, and several related documentation and debug packages.
The latest version for nodejs under RHSA-2020:3042 is 10.21.0-3.module+el8.0.0+7067+054302d1.
Yes, RHSA-2020:3042 addresses security fixes related to the nghttp2 package, specifically for large SETTI requests.