Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:0521 - Security Advisory
Issued:
2021-02-15
Updated:
2021-02-15

RHSA-2021:0521 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: rh-nodejs10-nodejs security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.23.1).

Security Fix(es):

  • libuv: buffer overflow in realpath (CVE-2020-8252)
  • nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
  • nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
  • nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
  • nodejs-dot-prop: prototype pollution (CVE-2020-8116)
  • nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
  • npm: sensitive information exposure through logs (CVE-2020-15095)
  • nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
  • nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)
  • nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7.7 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7.7 ppc64le
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.6 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7.6 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7.6 ppc64le
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7 ppc64le
  • Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64

Fixes

  • BZ - 1840004 - CVE-2020-7608 nodejs-yargs-parser: prototype pollution vulnerability
  • BZ - 1856875 - CVE-2020-15095 npm: sensitive information exposure through logs
  • BZ - 1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
  • BZ - 1868196 - CVE-2020-8116 nodejs-dot-prop: prototype pollution
  • BZ - 1879315 - CVE-2020-8252 libuv: buffer overflow in realpath
  • BZ - 1892430 - CVE-2020-7754 nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS
  • BZ - 1898680 - CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability
  • BZ - 1907444 - CVE-2020-7788 nodejs-ini: prototype pollution via malicious INI file
  • BZ - 1912854 - CVE-2020-8265 nodejs: use-after-free in the TLS implementation
  • BZ - 1912863 - CVE-2020-8287 nodejs: HTTP request smuggling via two copies of a header field in an http request

CVEs

  • CVE-2020-7608
  • CVE-2020-7754
  • CVE-2020-7774
  • CVE-2020-7788
  • CVE-2020-8116
  • CVE-2020-8252
  • CVE-2020-8265
  • CVE-2020-8287
  • CVE-2020-15095
  • CVE-2020-15366

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
x86_64
rh-nodejs10-nodejs-10.23.1-2.el7.x86_64.rpm SHA-256: 20e68b9c8b3be605f7571f4d55c37acbc895191c82ed4a918da8ba238e757d3e
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.x86_64.rpm SHA-256: bf18bf6c167b4c9001d62bf27efc966f3aa2d9a2334c8388bfda76fc382d8100
rh-nodejs10-nodejs-devel-10.23.1-2.el7.x86_64.rpm SHA-256: e1c054e0537c082f7113ffe4ac344c777f5bfda239adb6e7f2a56e4f0aa1c081
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.x86_64.rpm SHA-256: d9b1bceaea3d55db256d503853b7c79fee093dd7a75e87c53443ec3142354be7

Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7.7

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
s390x
rh-nodejs10-nodejs-10.23.1-2.el7.s390x.rpm SHA-256: 151065d5f178cf05ed62664f1cb8b358909cd416e75da441c30f26a33f2f174c
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.s390x.rpm SHA-256: 5938f67066e21e237f3bc299c1ae40c2e93bf3c312db56818cc9e79c41d6aa2f
rh-nodejs10-nodejs-devel-10.23.1-2.el7.s390x.rpm SHA-256: a0a0f4c620dc4d7ac65544ed73746dc5d042c5b036a00c17eba136927d34e360
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.s390x.rpm SHA-256: 523a18b80574bc1d1d5e2440a23d8a7e018aefb98a68889b6a89af3440c865bf

Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7.7

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
ppc64le
rh-nodejs10-nodejs-10.23.1-2.el7.ppc64le.rpm SHA-256: 82f23d619521ac8ae7be1112aa35aef4de543cfe49ca7224fa63a22a2bfa696d
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.ppc64le.rpm SHA-256: e5ce9889ad06aad2d471877bb3b556cc6921266f0268904f6679f216bbf3355a
rh-nodejs10-nodejs-devel-10.23.1-2.el7.ppc64le.rpm SHA-256: 5c0f30ea8066788394cc8b7bdc404489eb75ddcf028bd26afa7f213fc87f7fff
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.ppc64le.rpm SHA-256: 2c587ab6b67f210ecefbd66e519667ed2a64bf144cd3b4367b08d13d8eda663b

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.6

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
x86_64
rh-nodejs10-nodejs-10.23.1-2.el7.x86_64.rpm SHA-256: 20e68b9c8b3be605f7571f4d55c37acbc895191c82ed4a918da8ba238e757d3e
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.x86_64.rpm SHA-256: bf18bf6c167b4c9001d62bf27efc966f3aa2d9a2334c8388bfda76fc382d8100
rh-nodejs10-nodejs-devel-10.23.1-2.el7.x86_64.rpm SHA-256: e1c054e0537c082f7113ffe4ac344c777f5bfda239adb6e7f2a56e4f0aa1c081
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.x86_64.rpm SHA-256: d9b1bceaea3d55db256d503853b7c79fee093dd7a75e87c53443ec3142354be7

Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7.6

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
s390x
rh-nodejs10-nodejs-10.23.1-2.el7.s390x.rpm SHA-256: 151065d5f178cf05ed62664f1cb8b358909cd416e75da441c30f26a33f2f174c
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.s390x.rpm SHA-256: 5938f67066e21e237f3bc299c1ae40c2e93bf3c312db56818cc9e79c41d6aa2f
rh-nodejs10-nodejs-devel-10.23.1-2.el7.s390x.rpm SHA-256: a0a0f4c620dc4d7ac65544ed73746dc5d042c5b036a00c17eba136927d34e360
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.s390x.rpm SHA-256: 523a18b80574bc1d1d5e2440a23d8a7e018aefb98a68889b6a89af3440c865bf

Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7.6

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
ppc64le
rh-nodejs10-nodejs-10.23.1-2.el7.ppc64le.rpm SHA-256: 82f23d619521ac8ae7be1112aa35aef4de543cfe49ca7224fa63a22a2bfa696d
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.ppc64le.rpm SHA-256: e5ce9889ad06aad2d471877bb3b556cc6921266f0268904f6679f216bbf3355a
rh-nodejs10-nodejs-devel-10.23.1-2.el7.ppc64le.rpm SHA-256: 5c0f30ea8066788394cc8b7bdc404489eb75ddcf028bd26afa7f213fc87f7fff
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.ppc64le.rpm SHA-256: 2c587ab6b67f210ecefbd66e519667ed2a64bf144cd3b4367b08d13d8eda663b

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
x86_64
rh-nodejs10-nodejs-10.23.1-2.el7.x86_64.rpm SHA-256: 20e68b9c8b3be605f7571f4d55c37acbc895191c82ed4a918da8ba238e757d3e
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.x86_64.rpm SHA-256: bf18bf6c167b4c9001d62bf27efc966f3aa2d9a2334c8388bfda76fc382d8100
rh-nodejs10-nodejs-devel-10.23.1-2.el7.x86_64.rpm SHA-256: e1c054e0537c082f7113ffe4ac344c777f5bfda239adb6e7f2a56e4f0aa1c081
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.x86_64.rpm SHA-256: d9b1bceaea3d55db256d503853b7c79fee093dd7a75e87c53443ec3142354be7

Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
s390x
rh-nodejs10-nodejs-10.23.1-2.el7.s390x.rpm SHA-256: 151065d5f178cf05ed62664f1cb8b358909cd416e75da441c30f26a33f2f174c
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.s390x.rpm SHA-256: 5938f67066e21e237f3bc299c1ae40c2e93bf3c312db56818cc9e79c41d6aa2f
rh-nodejs10-nodejs-devel-10.23.1-2.el7.s390x.rpm SHA-256: a0a0f4c620dc4d7ac65544ed73746dc5d042c5b036a00c17eba136927d34e360
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.s390x.rpm SHA-256: 523a18b80574bc1d1d5e2440a23d8a7e018aefb98a68889b6a89af3440c865bf

Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
ppc64le
rh-nodejs10-nodejs-10.23.1-2.el7.ppc64le.rpm SHA-256: 82f23d619521ac8ae7be1112aa35aef4de543cfe49ca7224fa63a22a2bfa696d
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.ppc64le.rpm SHA-256: e5ce9889ad06aad2d471877bb3b556cc6921266f0268904f6679f216bbf3355a
rh-nodejs10-nodejs-devel-10.23.1-2.el7.ppc64le.rpm SHA-256: 5c0f30ea8066788394cc8b7bdc404489eb75ddcf028bd26afa7f213fc87f7fff
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.ppc64le.rpm SHA-256: 2c587ab6b67f210ecefbd66e519667ed2a64bf144cd3b4367b08d13d8eda663b

Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7

SRPM
rh-nodejs10-nodejs-10.23.1-2.el7.src.rpm SHA-256: c358573590fd92a914426379d050a7f1c0625fc0340a7622794559dd08ad9040
x86_64
rh-nodejs10-nodejs-10.23.1-2.el7.x86_64.rpm SHA-256: 20e68b9c8b3be605f7571f4d55c37acbc895191c82ed4a918da8ba238e757d3e
rh-nodejs10-nodejs-debuginfo-10.23.1-2.el7.x86_64.rpm SHA-256: bf18bf6c167b4c9001d62bf27efc966f3aa2d9a2334c8388bfda76fc382d8100
rh-nodejs10-nodejs-devel-10.23.1-2.el7.x86_64.rpm SHA-256: e1c054e0537c082f7113ffe4ac344c777f5bfda239adb6e7f2a56e4f0aa1c081
rh-nodejs10-nodejs-docs-10.23.1-2.el7.noarch.rpm SHA-256: c0966fae033a38f20993524d98cad02d3eac7fcd65386771126d494ea3844994
rh-nodejs10-npm-6.14.10-10.23.1.2.el7.x86_64.rpm SHA-256: d9b1bceaea3d55db256d503853b7c79fee093dd7a75e87c53443ec3142354be7

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility