[ALSA-2019:2925] Important: nodejs:10 security update
Type:
security
Severity:
important
Release date:
2019-09-30
Description:
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.16.3). Security Fix(es): * HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) * HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516) * HTTP/2: request for large response leads to denial of service (CVE-2019-9517) * HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
noarch nodejs-nodemon-1.18.3-1.module_el8.3.0+2023+d2377ea3.noarch.rpm 04839419f32ab8a8f93d5ef7535aa19efbf710e57f332e77be10e5fcc6042df5
noarch nodejs-packaging-17-3.module_el8.4.0+2224+b07ac28e.noarch.rpm 34d06c7655fa3e83fb4c8cd1af3eeee4471f30a9231142e5561fa34eac5e1cb5
noarch nodejs-nodemon-1.18.3-1.module_el8.3.0+2047+b07ac28e.noarch.rpm 41e8e5e619ef30a6a384a8bff1b4d85de08d11b9cfbb4c75fd8b7212afd630d4
noarch nodejs-packaging-17-3.module_el8.4.0+2521+c668cc9f.noarch.rpm 48a2bb3aaf5af5eb9eff27d730f873dfcb942c9bc4ff765f9fbcaddd031cd78f
noarch nodejs-packaging-17-3.module_el8.3.0+2023+d2377ea3.noarch.rpm 866fca29b11c2772a119fa9bcf208c5d4a6e7cea51445fcb2194e1ad3c4ddc0e
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.