First published: Thu Feb 13 2025(Updated: )
Moderate: nodejs:18 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-nodemon | <3.0.1-1.module+el9.5.0+22773+9a359385 | 3.0.1-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-packaging | <2021.06-4.module+el9.5.0+22773+9a359385 | 2021.06-4.module+el9.5.0+22773+9a359385 |
redhat/nodejs-docs | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-nodemon | <3.0.1-1.module+el9.5.0+22773+9a359385 | 3.0.1-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-packaging | <2021.06-4.module+el9.5.0+22773+9a359385 | 2021.06-4.module+el9.5.0+22773+9a359385 |
redhat/nodejs-packaging-bundler | <2021.06-4.module+el9.5.0+22773+9a359385 | 2021.06-4.module+el9.5.0+22773+9a359385 |
redhat/nodejs | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-debuginfo | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-debugsource | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-devel | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-full-i18n | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/npm | <10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385 | 10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-debuginfo | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-debugsource | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-devel | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-full-i18n | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/npm | <10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385 | 10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385 |
redhat/nodejs | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-debuginfo | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-debugsource | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-devel | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/nodejs-full-i18n | <18.20.6-1.module+el9.5.0+22773+9a359385 | 18.20.6-1.module+el9.5.0+22773+9a359385 |
redhat/npm | <10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385 | 10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385 |
redhat/nodejs | <18.20.6-1.module+el9.5.0+22773+9a359385.aa | 18.20.6-1.module+el9.5.0+22773+9a359385.aa |
redhat/nodejs-debuginfo | <18.20.6-1.module+el9.5.0+22773+9a359385.aa | 18.20.6-1.module+el9.5.0+22773+9a359385.aa |
redhat/nodejs-debugsource | <18.20.6-1.module+el9.5.0+22773+9a359385.aa | 18.20.6-1.module+el9.5.0+22773+9a359385.aa |
redhat/nodejs-devel | <18.20.6-1.module+el9.5.0+22773+9a359385.aa | 18.20.6-1.module+el9.5.0+22773+9a359385.aa |
redhat/nodejs-full-i18n | <18.20.6-1.module+el9.5.0+22773+9a359385.aa | 18.20.6-1.module+el9.5.0+22773+9a359385.aa |
redhat/npm | <10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385.aa | 10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1446 is classified as moderate.
To fix RHSA-2025:1446, update to the vulnerable packages to their remedied versions: nodejs 18.20.6-1.module+el9.5.0+22773+9a359385, nodejs-nodemon 3.0.1-1.module+el9.5.0+22773+9a359385, or nodejs-packaging 2021.06-4.module+el9.5.0+22773+9a359385.
RHSA-2025:1446 addresses the vulnerability in undici which uses insufficiently random values (CVE-2025-22150).
Node.js versions prior to 18.20.6 are affected by RHSA-2025:1446.
There are no specific workarounds for RHSA-2025:1446; updating to the fixed version is recommended.