Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:3042 - Security Advisory
Issued:
2020-07-21
Updated:
2020-07-21

RHSA-2020:3042 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: nodejs:10 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (10.21.0).

Security Fix(es):

  • nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
  • nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
  • nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0 x86_64

Fixes

  • BZ - 1813344 - CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload
  • BZ - 1844929 - CVE-2020-11080 nghttp2: overly large SETTINGS frames can lead to DoS
  • BZ - 1845256 - CVE-2020-8174 nodejs: memory corruption in napi_get_value_string_* functions

CVEs

  • CVE-2020-7598
  • CVE-2020-8174
  • CVE-2020-11080

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0

SRPM
nodejs-10.21.0-3.module+el8.0.0+7067+054302d1.src.rpm SHA-256: 2ad9a83c698be5227f82edc758b6a48b53b26f080891c568163a9766abf704ad
nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed.src.rpm SHA-256: fd478f2549e3bbf506de232a248b8fc61f0092d9fe186599745b0785cfc7e0c2
nodejs-packaging-17-3.module+el8+2873+aa7dfd9a.src.rpm SHA-256: 01c71dee45a43aeedaa345bfcb877f73db8e5c0af0c606d1f2a2745c3e353f73
ppc64le
nodejs-docs-10.21.0-3.module+el8.0.0+7067+054302d1.noarch.rpm SHA-256: 058710853b7cd1ae91737569139754a47161ff8d489f12cfe1288441590d8197
nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed.noarch.rpm SHA-256: 403e2a69dac714c9c946b51af2cbcd1e25bc88c8e762236725d95c457d75d48f
nodejs-packaging-17-3.module+el8+2873+aa7dfd9a.noarch.rpm SHA-256: 1e250d01555333a28809fb735793ce8a44b6b88ced07e80024722bd423ad6cda
nodejs-10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le.rpm SHA-256: 737c0b3ef7522bc76153b19d15cdc1a66e72338daf6efc86ae2f0be60d4f799d
nodejs-debuginfo-10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le.rpm SHA-256: 8857d42043ff4dc99cf3ce29e96469d5aae52e50f7aa6f7279c6725b0ffc2569
nodejs-debugsource-10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le.rpm SHA-256: 1cf7ebe5ed04489c932b45519b04e4e1148c3b46ad97a8e1ff936625c77401b4
nodejs-devel-10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le.rpm SHA-256: 25b2c3e110647c86db89f103ff55e4c89c5395325dd1a6185a30b088bc8c9fdd
nodejs-full-i18n-10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le.rpm SHA-256: e07b9ba5049988c0c0a2ad3c9ea23dd881eff30326b5496fc5fe67dec08f97c3
npm-6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le.rpm SHA-256: 8beb04d3870e6c23af995491fba221b7d275ca62ddad180453686bf25ca58805

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0

SRPM
nodejs-10.21.0-3.module+el8.0.0+7067+054302d1.src.rpm SHA-256: 2ad9a83c698be5227f82edc758b6a48b53b26f080891c568163a9766abf704ad
nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed.src.rpm SHA-256: fd478f2549e3bbf506de232a248b8fc61f0092d9fe186599745b0785cfc7e0c2
nodejs-packaging-17-3.module+el8+2873+aa7dfd9a.src.rpm SHA-256: 01c71dee45a43aeedaa345bfcb877f73db8e5c0af0c606d1f2a2745c3e353f73
x86_64
nodejs-10.21.0-3.module+el8.0.0+7067+054302d1.x86_64.rpm SHA-256: fe5f1baf8d56266c43c8376cd1d973e6eb0da7e64e6c11ae5285a7e7f8b66606
nodejs-debuginfo-10.21.0-3.module+el8.0.0+7067+054302d1.x86_64.rpm SHA-256: adc4f599281ac0a8f181782ba504a1df955779e3de78682d5ae03fe7399c2116
nodejs-debugsource-10.21.0-3.module+el8.0.0+7067+054302d1.x86_64.rpm SHA-256: e505f65d9de7e169394a7611059dd4696ab6a55c3a703ad6c715a1e2fb4acf25
nodejs-devel-10.21.0-3.module+el8.0.0+7067+054302d1.x86_64.rpm SHA-256: 7f5f3d50b9cb7f55f13c6f39f3f79a6701c269dabc44ce02b2dab51450c0a351
nodejs-docs-10.21.0-3.module+el8.0.0+7067+054302d1.noarch.rpm SHA-256: 058710853b7cd1ae91737569139754a47161ff8d489f12cfe1288441590d8197
nodejs-full-i18n-10.21.0-3.module+el8.0.0+7067+054302d1.x86_64.rpm SHA-256: 7b7cf18a7bde7e759455c84f0fbff4f7065e646147728f7b7a8589349e9b30ba
nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed.noarch.rpm SHA-256: 403e2a69dac714c9c946b51af2cbcd1e25bc88c8e762236725d95c457d75d48f
nodejs-packaging-17-3.module+el8+2873+aa7dfd9a.noarch.rpm SHA-256: 1e250d01555333a28809fb735793ce8a44b6b88ced07e80024722bd423ad6cda
npm-6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64.rpm SHA-256: cddea80f4a1b9e10e1418c1abc8ea17a29c023f4fb559f056b389c5b91dea2ec

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility