First published: Wed Feb 12 2025(Updated: )
Important: nodejs:20 security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Red Hat Enterprise Linux for Power, little endian | ||
Red Hat Enterprise Linux for IBM z Systems | ||
redhat/nodejs | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-nodemon | <3.0.1-1.module+el8.10.0+22767+a3309b10 | 3.0.1-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-packaging | <2021.06-4.module+el8.10.0+22767+a3309b10 | 2021.06-4.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-docs | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-nodemon | <3.0.1-1.module+el8.10.0+22767+a3309b10 | 3.0.1-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-packaging | <2021.06-4.module+el8.10.0+22767+a3309b10 | 2021.06-4.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-packaging-bundler | <2021.06-4.module+el8.10.0+22767+a3309b10 | 2021.06-4.module+el8.10.0+22767+a3309b10 |
redhat/nodejs | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-debuginfo | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-debugsource | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-devel | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-full-i18n | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/npm | <10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10 | 10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-debuginfo | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-debugsource | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-devel | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-full-i18n | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/npm | <10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10 | 10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-debuginfo | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-debugsource | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-devel | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs-full-i18n | <20.18.2-1.module+el8.10.0+22767+a3309b10 | 20.18.2-1.module+el8.10.0+22767+a3309b10 |
redhat/npm | <10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10 | 10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10 |
redhat/nodejs | <20.18.2-1.module+el8.10.0+22767+a3309b10.aa | 20.18.2-1.module+el8.10.0+22767+a3309b10.aa |
redhat/nodejs-debuginfo | <20.18.2-1.module+el8.10.0+22767+a3309b10.aa | 20.18.2-1.module+el8.10.0+22767+a3309b10.aa |
redhat/nodejs-debugsource | <20.18.2-1.module+el8.10.0+22767+a3309b10.aa | 20.18.2-1.module+el8.10.0+22767+a3309b10.aa |
redhat/nodejs-devel | <20.18.2-1.module+el8.10.0+22767+a3309b10.aa | 20.18.2-1.module+el8.10.0+22767+a3309b10.aa |
redhat/nodejs-full-i18n | <20.18.2-1.module+el8.10.0+22767+a3309b10.aa | 20.18.2-1.module+el8.10.0+22767+a3309b10.aa |
redhat/npm | <10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10.aa | 10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1351 is classified as Important.
To fix RHSA-2025:1351, update affected packages to the specified versions, such as nodejs to 20.18.2-1.module+el8.10.0+22767+a3309b10.
RHSA-2025:1351 addresses vulnerabilities related to insufficiently random values in the undici library (CVE-2025-22150).
RHSA-2025:1351 affects multiple Red Hat Enterprise Linux systems, including x86_64, ARM 64, Power, and IBM z Systems.
The RHSA-2025:1351 advisory was released on March 13, 2025.