[ALSA-2021:0548] Moderate: nodejs:10 security update
Type:
security
Severity:
moderate
Release date:
2021-02-16
Description:
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.23.1). Security Fix(es): * libuv: buffer overflow in realpath (CVE-2020-8252) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-dot-prop: prototype pollution (CVE-2020-8116) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * npm: sensitive information exposure through logs (CVE-2020-15095) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
noarch nodejs-nodemon-1.18.3-1.module_el8.3.0+2023+d2377ea3.noarch.rpm 04839419f32ab8a8f93d5ef7535aa19efbf710e57f332e77be10e5fcc6042df5
noarch nodejs-packaging-17-3.module_el8.4.0+2224+b07ac28e.noarch.rpm 34d06c7655fa3e83fb4c8cd1af3eeee4471f30a9231142e5561fa34eac5e1cb5
noarch nodejs-nodemon-1.18.3-1.module_el8.3.0+2047+b07ac28e.noarch.rpm 41e8e5e619ef30a6a384a8bff1b4d85de08d11b9cfbb4c75fd8b7212afd630d4
noarch nodejs-packaging-17-3.module_el8.4.0+2521+c668cc9f.noarch.rpm 48a2bb3aaf5af5eb9eff27d730f873dfcb942c9bc4ff765f9fbcaddd031cd78f
noarch nodejs-packaging-17-3.module_el8.3.0+2023+d2377ea3.noarch.rpm 866fca29b11c2772a119fa9bcf208c5d4a6e7cea51445fcb2194e1ad3c4ddc0e
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.