Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:1742 - Security Advisory
Issued:
2023-04-12
Updated:
2023-04-12

RHSA-2023:1742 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: nodejs:14 security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (14.21.3).

Security Fix(es):

  • decode-uri-component: improper input validation resulting in DoS (CVE-2022-38900)
  • glob-parent: Regular Expression Denial of Service (CVE-2021-35065)
  • nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
  • nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
  • nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
  • minimist: prototype pollution (CVE-2021-44906)
  • node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
  • nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
  • c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
  • express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)
  • http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
  • nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
  • nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
  • Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)
  • nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
  • Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2040839 - CVE-2021-44531 nodejs: Improper handling of URI Subject Alternative Names
  • BZ - 2040846 - CVE-2021-44532 nodejs: Certificate Verification Bypass via String Injection
  • BZ - 2040856 - CVE-2021-44533 nodejs: Incorrect handling of certificate subject and issuer fields
  • BZ - 2040862 - CVE-2022-21824 nodejs: Prototype pollution via console.table properties
  • BZ - 2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor
  • BZ - 2066009 - CVE-2021-44906 minimist: prototype pollution
  • BZ - 2130518 - CVE-2022-35256 nodejs: HTTP Request Smuggling due to incorrect parsing of header fields
  • BZ - 2134609 - CVE-2022-3517 nodejs-minimatch: ReDoS via the braceExpand function
  • BZ - 2140911 - CVE-2022-43548 nodejs: DNS rebinding in inspect via invalid octal IP address
  • BZ - 2142822 - nodejs:14/nodejs: Rebase to the latest Nodejs 14 release [rhel-8] [rhel-8.6.0.z]
  • BZ - 2150323 - CVE-2022-24999 express: "qs" prototype poisoning causes the hang of the node process
  • BZ - 2156324 - CVE-2021-35065 glob-parent: Regular Expression Denial of Service
  • BZ - 2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
  • BZ - 2168631 - CVE-2022-4904 c-ares: buffer overflow in config_sortlist() due to missing string length check
  • BZ - 2170644 - CVE-2022-38900 decode-uri-component: improper input validation resulting in DoS
  • BZ - 2171935 - CVE-2023-23918 Node.js: Permissions policies can be bypassed via process.mainModule
  • BZ - 2172217 - CVE-2023-23920 Node.js: insecure loading of ICU data through ICU_DATA environment variable
  • BZ - 2175827 - nodejs:14/nodejs: Rebase to the latest Nodejs 14 release [rhel-8] [rhel-8.6.0.z]

CVEs

  • CVE-2021-35065
  • CVE-2021-44531
  • CVE-2021-44532
  • CVE-2021-44533
  • CVE-2021-44906
  • CVE-2022-0235
  • CVE-2022-3517
  • CVE-2022-4904
  • CVE-2022-21824
  • CVE-2022-24999
  • CVE-2022-25881
  • CVE-2022-35256
  • CVE-2022-38900
  • CVE-2022-43548
  • CVE-2023-23918
  • CVE-2023-23920

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 876aee80af56e8d10ba32c9ae2b08386cc4245397ad4514189754ef1c4ead9ba
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 2708e94c0f44e26608bd25e177a5be49e6fe470d7a7b5da8d9dc38b6ff55e1fe
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
x86_64
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 2aa7cad73f7f40b3ffeb4e36cee963a6df6ea9c57c3631ac060dcb97b9724bd4
nodejs-debuginfo-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: dfea55cb60e656db9ea75133cc2478aa4c8b03d108ed49532c10bc6d2645ee6c
nodejs-debugsource-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 10cc92cbdb0d45e05862f5636966a28710a6f548c06dca5409632606beab8940
nodejs-devel-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 8987c4000bf7b7acbd3995e605983e9a2f23ed3fc84c4b6fa41de004a39f213c
nodejs-docs-14.21.3-1.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 338ac1d50783e8ad9fa97f902b40a3592ca827d0bd8eb19c91c312b931654d73
nodejs-full-i18n-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 34f316f35e358405ad1ef7cc209dc81695a6b319c5bb53199db3ef8760a88346
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 726eb2b11c89959c738643d8facc552bc04fb3c7c0fd3f2c8ae25d0a285ef55c
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
npm-6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: b1d3b66e2e99761af55ddd7fb4ae86aa016fd9bb19106b184d82fd8aa3c59904

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6

SRPM
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 876aee80af56e8d10ba32c9ae2b08386cc4245397ad4514189754ef1c4ead9ba
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 2708e94c0f44e26608bd25e177a5be49e6fe470d7a7b5da8d9dc38b6ff55e1fe
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
x86_64
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 2aa7cad73f7f40b3ffeb4e36cee963a6df6ea9c57c3631ac060dcb97b9724bd4
nodejs-debuginfo-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: dfea55cb60e656db9ea75133cc2478aa4c8b03d108ed49532c10bc6d2645ee6c
nodejs-debugsource-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 10cc92cbdb0d45e05862f5636966a28710a6f548c06dca5409632606beab8940
nodejs-devel-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 8987c4000bf7b7acbd3995e605983e9a2f23ed3fc84c4b6fa41de004a39f213c
nodejs-docs-14.21.3-1.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 338ac1d50783e8ad9fa97f902b40a3592ca827d0bd8eb19c91c312b931654d73
nodejs-full-i18n-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 34f316f35e358405ad1ef7cc209dc81695a6b319c5bb53199db3ef8760a88346
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 726eb2b11c89959c738643d8facc552bc04fb3c7c0fd3f2c8ae25d0a285ef55c
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
npm-6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: b1d3b66e2e99761af55ddd7fb4ae86aa016fd9bb19106b184d82fd8aa3c59904

Red Hat Enterprise Linux Server - AUS 8.6

SRPM
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 876aee80af56e8d10ba32c9ae2b08386cc4245397ad4514189754ef1c4ead9ba
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 2708e94c0f44e26608bd25e177a5be49e6fe470d7a7b5da8d9dc38b6ff55e1fe
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
x86_64
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 2aa7cad73f7f40b3ffeb4e36cee963a6df6ea9c57c3631ac060dcb97b9724bd4
nodejs-debuginfo-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: dfea55cb60e656db9ea75133cc2478aa4c8b03d108ed49532c10bc6d2645ee6c
nodejs-debugsource-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 10cc92cbdb0d45e05862f5636966a28710a6f548c06dca5409632606beab8940
nodejs-devel-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 8987c4000bf7b7acbd3995e605983e9a2f23ed3fc84c4b6fa41de004a39f213c
nodejs-docs-14.21.3-1.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 338ac1d50783e8ad9fa97f902b40a3592ca827d0bd8eb19c91c312b931654d73
nodejs-full-i18n-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 34f316f35e358405ad1ef7cc209dc81695a6b319c5bb53199db3ef8760a88346
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 726eb2b11c89959c738643d8facc552bc04fb3c7c0fd3f2c8ae25d0a285ef55c
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
npm-6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: b1d3b66e2e99761af55ddd7fb4ae86aa016fd9bb19106b184d82fd8aa3c59904

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 876aee80af56e8d10ba32c9ae2b08386cc4245397ad4514189754ef1c4ead9ba
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 2708e94c0f44e26608bd25e177a5be49e6fe470d7a7b5da8d9dc38b6ff55e1fe
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
s390x
nodejs-docs-14.21.3-1.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 338ac1d50783e8ad9fa97f902b40a3592ca827d0bd8eb19c91c312b931654d73
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 726eb2b11c89959c738643d8facc552bc04fb3c7c0fd3f2c8ae25d0a285ef55c
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.s390x.rpm SHA-256: 9d636c8a541ab95a4cbd865e3338ea3e689c77da898ca3e593ae2364bc70cd18
nodejs-debuginfo-14.21.3-1.module+el8.6.0+18532+cbe6f646.s390x.rpm SHA-256: 0fa96432572b59dd0e172da47adbc8dd8a2a1dbfadd9df214e0b287074fb7044
nodejs-debugsource-14.21.3-1.module+el8.6.0+18532+cbe6f646.s390x.rpm SHA-256: 53f7b6da25656d55c18f1c0ab7f2851b3b0111314945dd857b5310adff3477e7
nodejs-devel-14.21.3-1.module+el8.6.0+18532+cbe6f646.s390x.rpm SHA-256: 948fcb4b8f229aa862edeb5def54d195352225c84469737433e5cde60048b148
nodejs-full-i18n-14.21.3-1.module+el8.6.0+18532+cbe6f646.s390x.rpm SHA-256: 701d01ee4ea0b67b994ec88c813b75545d455915a62cb2136961d450be36bf22
npm-6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.s390x.rpm SHA-256: e1c6353a6d94ef811a0ad3d8df781b76b3798513136b0266637035884d9183d7

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 876aee80af56e8d10ba32c9ae2b08386cc4245397ad4514189754ef1c4ead9ba
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 2708e94c0f44e26608bd25e177a5be49e6fe470d7a7b5da8d9dc38b6ff55e1fe
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
ppc64le
nodejs-docs-14.21.3-1.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 338ac1d50783e8ad9fa97f902b40a3592ca827d0bd8eb19c91c312b931654d73
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 726eb2b11c89959c738643d8facc552bc04fb3c7c0fd3f2c8ae25d0a285ef55c
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: ec43184bf1f4d96bfe4365009b9cebdc31cc377987878989934bd470f74f0754
nodejs-debuginfo-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: b71a936bb7f1cf504315c2fde8061070364bc2531fe2e51da0d52e7fe638193d
nodejs-debugsource-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: f786d76fc920d308f3318c9db2135ea84a6c1ae8573a1d0fd94164140fb89720
nodejs-devel-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: 5db0597c6980a6f8ac10bd32b6a3842852ed060805a8455ad92223f631168bd8
nodejs-full-i18n-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: b2cd494f1b7229e91d4152bc227610f7a3dfd76aec035dd00776c12749063b29
npm-6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: 8745ee49a71c373ca0f4d5f8f7d7dd131a1d4fe22889df7585d6aca0e9e13ed8

Red Hat Enterprise Linux Server - TUS 8.6

SRPM
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 876aee80af56e8d10ba32c9ae2b08386cc4245397ad4514189754ef1c4ead9ba
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 2708e94c0f44e26608bd25e177a5be49e6fe470d7a7b5da8d9dc38b6ff55e1fe
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
x86_64
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 2aa7cad73f7f40b3ffeb4e36cee963a6df6ea9c57c3631ac060dcb97b9724bd4
nodejs-debuginfo-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: dfea55cb60e656db9ea75133cc2478aa4c8b03d108ed49532c10bc6d2645ee6c
nodejs-debugsource-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 10cc92cbdb0d45e05862f5636966a28710a6f548c06dca5409632606beab8940
nodejs-devel-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 8987c4000bf7b7acbd3995e605983e9a2f23ed3fc84c4b6fa41de004a39f213c
nodejs-docs-14.21.3-1.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 338ac1d50783e8ad9fa97f902b40a3592ca827d0bd8eb19c91c312b931654d73
nodejs-full-i18n-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 34f316f35e358405ad1ef7cc209dc81695a6b319c5bb53199db3ef8760a88346
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 726eb2b11c89959c738643d8facc552bc04fb3c7c0fd3f2c8ae25d0a285ef55c
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
npm-6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: b1d3b66e2e99761af55ddd7fb4ae86aa016fd9bb19106b184d82fd8aa3c59904

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 876aee80af56e8d10ba32c9ae2b08386cc4245397ad4514189754ef1c4ead9ba
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 2708e94c0f44e26608bd25e177a5be49e6fe470d7a7b5da8d9dc38b6ff55e1fe
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
aarch64
nodejs-docs-14.21.3-1.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 338ac1d50783e8ad9fa97f902b40a3592ca827d0bd8eb19c91c312b931654d73
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 726eb2b11c89959c738643d8facc552bc04fb3c7c0fd3f2c8ae25d0a285ef55c
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.aarch64.rpm SHA-256: e8d44d08c66465af2d5d59d6adaae1c51bdbcae6ebb7948039046edc2af381fd
nodejs-debuginfo-14.21.3-1.module+el8.6.0+18532+cbe6f646.aarch64.rpm SHA-256: cebae04b95100e8248116af1accb7b5c85cf76b07123af0107074642b06706db
nodejs-debugsource-14.21.3-1.module+el8.6.0+18532+cbe6f646.aarch64.rpm SHA-256: 8742ac9ece03d1b539e35d8593a615d2dd9b1d7a03046aabc8cebfdb2179ef9b
nodejs-devel-14.21.3-1.module+el8.6.0+18532+cbe6f646.aarch64.rpm SHA-256: 9d4f9d3b89989f1ba044c429b3d0a2bf94b55741e1a95499488055cbc95f172d
nodejs-full-i18n-14.21.3-1.module+el8.6.0+18532+cbe6f646.aarch64.rpm SHA-256: 8084927a192bfb2896d7372429277f3d7a9abac9e2e588c92ced5bdd849eb3ed
npm-6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.aarch64.rpm SHA-256: 0dd09f278a6e0b4722cdb0a7c2aecf8927707c17e794a638c50843f444feecdf

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 876aee80af56e8d10ba32c9ae2b08386cc4245397ad4514189754ef1c4ead9ba
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 2708e94c0f44e26608bd25e177a5be49e6fe470d7a7b5da8d9dc38b6ff55e1fe
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
ppc64le
nodejs-docs-14.21.3-1.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 338ac1d50783e8ad9fa97f902b40a3592ca827d0bd8eb19c91c312b931654d73
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 726eb2b11c89959c738643d8facc552bc04fb3c7c0fd3f2c8ae25d0a285ef55c
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: ec43184bf1f4d96bfe4365009b9cebdc31cc377987878989934bd470f74f0754
nodejs-debuginfo-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: b71a936bb7f1cf504315c2fde8061070364bc2531fe2e51da0d52e7fe638193d
nodejs-debugsource-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: f786d76fc920d308f3318c9db2135ea84a6c1ae8573a1d0fd94164140fb89720
nodejs-devel-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: 5db0597c6980a6f8ac10bd32b6a3842852ed060805a8455ad92223f631168bd8
nodejs-full-i18n-14.21.3-1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: b2cd494f1b7229e91d4152bc227610f7a3dfd76aec035dd00776c12749063b29
npm-6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.ppc64le.rpm SHA-256: 8745ee49a71c373ca0f4d5f8f7d7dd131a1d4fe22889df7585d6aca0e9e13ed8

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 876aee80af56e8d10ba32c9ae2b08386cc4245397ad4514189754ef1c4ead9ba
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.src.rpm SHA-256: 2708e94c0f44e26608bd25e177a5be49e6fe470d7a7b5da8d9dc38b6ff55e1fe
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.src.rpm SHA-256: 550d2f0197e4e69e9cfba813170d0fab3911749327f0c30db022424702287709
x86_64
nodejs-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 2aa7cad73f7f40b3ffeb4e36cee963a6df6ea9c57c3631ac060dcb97b9724bd4
nodejs-debuginfo-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: dfea55cb60e656db9ea75133cc2478aa4c8b03d108ed49532c10bc6d2645ee6c
nodejs-debugsource-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 10cc92cbdb0d45e05862f5636966a28710a6f548c06dca5409632606beab8940
nodejs-devel-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 8987c4000bf7b7acbd3995e605983e9a2f23ed3fc84c4b6fa41de004a39f213c
nodejs-docs-14.21.3-1.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 338ac1d50783e8ad9fa97f902b40a3592ca827d0bd8eb19c91c312b931654d73
nodejs-full-i18n-14.21.3-1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: 34f316f35e358405ad1ef7cc209dc81695a6b319c5bb53199db3ef8760a88346
nodejs-nodemon-2.0.20-3.module+el8.6.0+18532+cbe6f646.noarch.rpm SHA-256: 726eb2b11c89959c738643d8facc552bc04fb3c7c0fd3f2c8ae25d0a285ef55c
nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83.noarch.rpm SHA-256: d0ffb55491051b33ed7a0c9d1dfeb65ef76f367c9df1065140d0fa830091b169
npm-6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.x86_64.rpm SHA-256: b1d3b66e2e99761af55ddd7fb4ae86aa016fd9bb19106b184d82fd8aa3c59904

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility