First published: Mon Oct 19 2020(Updated: )
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. <br>The following packages have been upgraded to a later upstream version: nodejs (12.18.4).<br>Security Fix(es):<br><li> nodejs-dot-prop: prototype pollution (CVE-2020-8116)</li> <li> nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201)</li> <li> npm: Sensitive information exposure through logs (CVE-2020-15095)</li> <li> libuv: buffer overflow in realpath (CVE-2020-8252)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> The nodejs:12/development module is not installable (BZ#1883966)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-nodemon | <1.18.3-1.module+el8.1.0+3369+37ae6a45 | 1.18.3-1.module+el8.1.0+3369+37ae6a45 |
redhat/nodejs-packaging | <17-3.module+el8.1.0+3369+37ae6a45 | 17-3.module+el8.1.0+3369+37ae6a45 |
redhat/nodejs-docs | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-nodemon | <1.18.3-1.module+el8.1.0+3369+37ae6a45 | 1.18.3-1.module+el8.1.0+3369+37ae6a45 |
redhat/nodejs-packaging | <17-3.module+el8.1.0+3369+37ae6a45 | 17-3.module+el8.1.0+3369+37ae6a45 |
redhat/nodejs | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-debuginfo | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-debugsource | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-devel | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-full-i18n | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/npm | <6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e | 6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e |
redhat/nodejs-debuginfo | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-debugsource | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-devel | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-full-i18n | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/npm | <6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e | 6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e |
redhat/nodejs | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-debuginfo | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-debugsource | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-devel | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/nodejs-full-i18n | <12.18.4-2.module+el8.2.0+8361+192e434e | 12.18.4-2.module+el8.2.0+8361+192e434e |
redhat/npm | <6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e | 6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e |
redhat/nodejs | <12.18.4-2.module+el8.2.0+8361+192e434e.aa | 12.18.4-2.module+el8.2.0+8361+192e434e.aa |
redhat/nodejs-debuginfo | <12.18.4-2.module+el8.2.0+8361+192e434e.aa | 12.18.4-2.module+el8.2.0+8361+192e434e.aa |
redhat/nodejs-debugsource | <12.18.4-2.module+el8.2.0+8361+192e434e.aa | 12.18.4-2.module+el8.2.0+8361+192e434e.aa |
redhat/nodejs-devel | <12.18.4-2.module+el8.2.0+8361+192e434e.aa | 12.18.4-2.module+el8.2.0+8361+192e434e.aa |
redhat/nodejs-full-i18n | <12.18.4-2.module+el8.2.0+8361+192e434e.aa | 12.18.4-2.module+el8.2.0+8361+192e434e.aa |
redhat/npm | <6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aa | 6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.