Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:1533 - Security Advisory
Issued:
2023-03-30
Updated:
2023-03-30

RHSA-2023:1533 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: nodejs:14 security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (14.21.3).

Security Fix(es):

  • decode-uri-component: improper input validation resulting in DoS (CVE-2022-38900)
  • glob-parent: Regular Expression Denial of Service (CVE-2021-35065)
  • minimist: prototype pollution (CVE-2021-44906)
  • nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
  • c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
  • express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)
  • http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
  • nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
  • nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
  • Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)
  • Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2066009 - CVE-2021-44906 minimist: prototype pollution
  • BZ - 2130518 - CVE-2022-35256 nodejs: HTTP Request Smuggling due to incorrect parsing of header fields
  • BZ - 2134609 - CVE-2022-3517 nodejs-minimatch: ReDoS via the braceExpand function
  • BZ - 2140911 - CVE-2022-43548 nodejs: DNS rebinding in inspect via invalid octal IP address
  • BZ - 2142823 - nodejs:14/nodejs: Rebase to the latest Nodejs 14 release [rhel-8] [rhel-8.4.0.z]
  • BZ - 2150323 - CVE-2022-24999 express: "qs" prototype poisoning causes the hang of the node process
  • BZ - 2156324 - CVE-2021-35065 glob-parent: Regular Expression Denial of Service
  • BZ - 2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
  • BZ - 2168631 - CVE-2022-4904 c-ares: buffer overflow in config_sortlist() due to missing string length check
  • BZ - 2170644 - CVE-2022-38900 decode-uri-component: improper input validation resulting in DoS
  • BZ - 2171935 - CVE-2023-23918 Node.js: Permissions policies can be bypassed via process.mainModule
  • BZ - 2172217 - CVE-2023-23920 Node.js: insecure loading of ICU data through ICU_DATA environment variable
  • BZ - 2175828 - nodejs:14/nodejs: Rebase to the latest Nodejs 14 release [rhel-8] [rhel-8.4.0.z]

CVEs

  • CVE-2021-35065
  • CVE-2021-44906
  • CVE-2022-3517
  • CVE-2022-4904
  • CVE-2022-24999
  • CVE-2022-25881
  • CVE-2022-35256
  • CVE-2022-38900
  • CVE-2022-43548
  • CVE-2023-23918
  • CVE-2023-23920

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 07c96f425e0104adbda6ba720d049063604224ba84526749ac2e0ea24d9386ad
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 27239ca08caaa8405951cdfd355912dcc59a18f4817c479d8a57b38dd2830099
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
x86_64
nodejs-docs-14.21.3-1.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 1ceb6d496343a9d8b70d5612486c83048a4f7810a038e56050954a3718d64745
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 6f420d462280cd84a1553b54b8ea1ea05c115d40623ae8875289f3ad08793114
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 8cda26c081db7f1659119dbf4d3ff7b9c2d2f0d41ba80c86815ac7eb990de467
nodejs-debuginfo-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 3dd73a94f85c1e9dc1f559c3dcfc0bb3f225a05ea88a90470b4fe8f28596e1e5
nodejs-debugsource-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: f49ffe68291ed83f262374fbab8c6c0270b03d7c3f464374ba4125badf83d279
nodejs-devel-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 161a522c06addb6958a10ab5d79be549b8c8d925fb43b687a4cbc647e15d7491
nodejs-full-i18n-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 629edf40ea86fb6a8cdb052bf3bdf782ed185880afadcec2485dcfa075a98327
npm-6.14.18-1.14.21.3.1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: d0c8cc8c4fd82709605e12590f9b2417e68fb2d0b8b23d574ea0767ad5e789b6

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 07c96f425e0104adbda6ba720d049063604224ba84526749ac2e0ea24d9386ad
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 27239ca08caaa8405951cdfd355912dcc59a18f4817c479d8a57b38dd2830099
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
x86_64
nodejs-docs-14.21.3-1.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 1ceb6d496343a9d8b70d5612486c83048a4f7810a038e56050954a3718d64745
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 6f420d462280cd84a1553b54b8ea1ea05c115d40623ae8875289f3ad08793114
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 8cda26c081db7f1659119dbf4d3ff7b9c2d2f0d41ba80c86815ac7eb990de467
nodejs-debuginfo-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 3dd73a94f85c1e9dc1f559c3dcfc0bb3f225a05ea88a90470b4fe8f28596e1e5
nodejs-debugsource-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: f49ffe68291ed83f262374fbab8c6c0270b03d7c3f464374ba4125badf83d279
nodejs-devel-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 161a522c06addb6958a10ab5d79be549b8c8d925fb43b687a4cbc647e15d7491
nodejs-full-i18n-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 629edf40ea86fb6a8cdb052bf3bdf782ed185880afadcec2485dcfa075a98327
npm-6.14.18-1.14.21.3.1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: d0c8cc8c4fd82709605e12590f9b2417e68fb2d0b8b23d574ea0767ad5e789b6

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 07c96f425e0104adbda6ba720d049063604224ba84526749ac2e0ea24d9386ad
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 27239ca08caaa8405951cdfd355912dcc59a18f4817c479d8a57b38dd2830099
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
s390x
nodejs-docs-14.21.3-1.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 1ceb6d496343a9d8b70d5612486c83048a4f7810a038e56050954a3718d64745
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 6f420d462280cd84a1553b54b8ea1ea05c115d40623ae8875289f3ad08793114
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.s390x.rpm SHA-256: 16c0d659088d1e7680619ba82a742f23b04778aecc8aace67301518fb6b037c3
nodejs-debuginfo-14.21.3-1.module+el8.4.0+18317+43f5ac16.s390x.rpm SHA-256: a4e8d48a7eee3408195c0715272c668849f9098a3a5b42de9415d8f639d017c1
nodejs-debugsource-14.21.3-1.module+el8.4.0+18317+43f5ac16.s390x.rpm SHA-256: 10eafea1cf18a9f0adc5d685b2700fad76107305fce8515382f0c79c399493cd
nodejs-devel-14.21.3-1.module+el8.4.0+18317+43f5ac16.s390x.rpm SHA-256: 5fe5e9037a6d5c233c682ae1d3b962908146bf9579b0ca6eb15d663656bf3a71
nodejs-full-i18n-14.21.3-1.module+el8.4.0+18317+43f5ac16.s390x.rpm SHA-256: 5a65b62ee3aeb12af767a0b7e52d888bd1f0d2a0b4b016d5ef76d66faebc9733
npm-6.14.18-1.14.21.3.1.module+el8.4.0+18317+43f5ac16.s390x.rpm SHA-256: 9c364b037d44f831043f36a76eb0b8a24b4cd946e54d4681113ecfd76cf368a1

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 07c96f425e0104adbda6ba720d049063604224ba84526749ac2e0ea24d9386ad
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 27239ca08caaa8405951cdfd355912dcc59a18f4817c479d8a57b38dd2830099
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
ppc64le
nodejs-docs-14.21.3-1.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 1ceb6d496343a9d8b70d5612486c83048a4f7810a038e56050954a3718d64745
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 6f420d462280cd84a1553b54b8ea1ea05c115d40623ae8875289f3ad08793114
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: 3d462fc52e874466a8f9e35fadc8d3b43d8164a025fa02331bc52551e8c2f4d5
nodejs-debuginfo-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: dcba8972acaeff857906b93711c74b79f8130108c44799a8991f5d8a13d82572
nodejs-debugsource-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: 913ceb5fea0ae79fd4e16ebfac51faf47c649baf4e8c3c911b3cc85cfef0966d
nodejs-devel-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: 49bb43d58f05cbffca78ac4d8daa34671da2f28b1c74441a93e871dbbd435263
nodejs-full-i18n-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: 764c80666b4c735775775fdcb9b8a45cb0c294678f21594b97087d5289defe14
npm-6.14.18-1.14.21.3.1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: f1213c3aea2ba543aa84f09573e866078353478c178139e48dafc7e399c05ac9

Red Hat Enterprise Linux Server - TUS 8.4

SRPM
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 07c96f425e0104adbda6ba720d049063604224ba84526749ac2e0ea24d9386ad
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 27239ca08caaa8405951cdfd355912dcc59a18f4817c479d8a57b38dd2830099
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
x86_64
nodejs-docs-14.21.3-1.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 1ceb6d496343a9d8b70d5612486c83048a4f7810a038e56050954a3718d64745
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 6f420d462280cd84a1553b54b8ea1ea05c115d40623ae8875289f3ad08793114
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 8cda26c081db7f1659119dbf4d3ff7b9c2d2f0d41ba80c86815ac7eb990de467
nodejs-debuginfo-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 3dd73a94f85c1e9dc1f559c3dcfc0bb3f225a05ea88a90470b4fe8f28596e1e5
nodejs-debugsource-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: f49ffe68291ed83f262374fbab8c6c0270b03d7c3f464374ba4125badf83d279
nodejs-devel-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 161a522c06addb6958a10ab5d79be549b8c8d925fb43b687a4cbc647e15d7491
nodejs-full-i18n-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 629edf40ea86fb6a8cdb052bf3bdf782ed185880afadcec2485dcfa075a98327
npm-6.14.18-1.14.21.3.1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: d0c8cc8c4fd82709605e12590f9b2417e68fb2d0b8b23d574ea0767ad5e789b6

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 07c96f425e0104adbda6ba720d049063604224ba84526749ac2e0ea24d9386ad
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 27239ca08caaa8405951cdfd355912dcc59a18f4817c479d8a57b38dd2830099
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
aarch64
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.aarch64.rpm SHA-256: 883a4554b01c861fe36271ca8df6f745d22feb20b531ebd2896f47bc3bed3b19
nodejs-debuginfo-14.21.3-1.module+el8.4.0+18317+43f5ac16.aarch64.rpm SHA-256: 86405bcb4746b4a2383cbb83f28a05b283c93b4add7bcc45c61cba3f1a92ac44
nodejs-debugsource-14.21.3-1.module+el8.4.0+18317+43f5ac16.aarch64.rpm SHA-256: 6b753d678206832700f09802fe2cbbc52ccb32be6229dbe7a1c6632326690426
nodejs-devel-14.21.3-1.module+el8.4.0+18317+43f5ac16.aarch64.rpm SHA-256: 639ffdb2c4a92fa424e46b200820e713326b5bb7acb11bf156435432f55a3abc
nodejs-docs-14.21.3-1.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 1ceb6d496343a9d8b70d5612486c83048a4f7810a038e56050954a3718d64745
nodejs-full-i18n-14.21.3-1.module+el8.4.0+18317+43f5ac16.aarch64.rpm SHA-256: d8d2ea7049e3ac6da178f355f4f12c794a2de497e263caeba5a5be11f3639383
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 6f420d462280cd84a1553b54b8ea1ea05c115d40623ae8875289f3ad08793114
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
npm-6.14.18-1.14.21.3.1.module+el8.4.0+18317+43f5ac16.aarch64.rpm SHA-256: 207165d909e72a312156df54e0c645f68f1f0d59bff45afe5b9f765ca398e6c6

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 07c96f425e0104adbda6ba720d049063604224ba84526749ac2e0ea24d9386ad
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 27239ca08caaa8405951cdfd355912dcc59a18f4817c479d8a57b38dd2830099
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
ppc64le
nodejs-docs-14.21.3-1.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 1ceb6d496343a9d8b70d5612486c83048a4f7810a038e56050954a3718d64745
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 6f420d462280cd84a1553b54b8ea1ea05c115d40623ae8875289f3ad08793114
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: 3d462fc52e874466a8f9e35fadc8d3b43d8164a025fa02331bc52551e8c2f4d5
nodejs-debuginfo-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: dcba8972acaeff857906b93711c74b79f8130108c44799a8991f5d8a13d82572
nodejs-debugsource-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: 913ceb5fea0ae79fd4e16ebfac51faf47c649baf4e8c3c911b3cc85cfef0966d
nodejs-devel-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: 49bb43d58f05cbffca78ac4d8daa34671da2f28b1c74441a93e871dbbd435263
nodejs-full-i18n-14.21.3-1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: 764c80666b4c735775775fdcb9b8a45cb0c294678f21594b97087d5289defe14
npm-6.14.18-1.14.21.3.1.module+el8.4.0+18317+43f5ac16.ppc64le.rpm SHA-256: f1213c3aea2ba543aa84f09573e866078353478c178139e48dafc7e399c05ac9

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 07c96f425e0104adbda6ba720d049063604224ba84526749ac2e0ea24d9386ad
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.src.rpm SHA-256: 27239ca08caaa8405951cdfd355912dcc59a18f4817c479d8a57b38dd2830099
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
x86_64
nodejs-docs-14.21.3-1.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 1ceb6d496343a9d8b70d5612486c83048a4f7810a038e56050954a3718d64745
nodejs-nodemon-2.0.20-3.module+el8.4.0+18317+43f5ac16.noarch.rpm SHA-256: 6f420d462280cd84a1553b54b8ea1ea05c115d40623ae8875289f3ad08793114
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 8cda26c081db7f1659119dbf4d3ff7b9c2d2f0d41ba80c86815ac7eb990de467
nodejs-debuginfo-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 3dd73a94f85c1e9dc1f559c3dcfc0bb3f225a05ea88a90470b4fe8f28596e1e5
nodejs-debugsource-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: f49ffe68291ed83f262374fbab8c6c0270b03d7c3f464374ba4125badf83d279
nodejs-devel-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 161a522c06addb6958a10ab5d79be549b8c8d925fb43b687a4cbc647e15d7491
nodejs-full-i18n-14.21.3-1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: 629edf40ea86fb6a8cdb052bf3bdf782ed185880afadcec2485dcfa075a98327
npm-6.14.18-1.14.21.3.1.module+el8.4.0+18317+43f5ac16.x86_64.rpm SHA-256: d0c8cc8c4fd82709605e12590f9b2417e68fb2d0b8b23d574ea0767ad5e789b6

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility