SECURITY: Fedora 33 Update: nodejs-14.15.1-1.fc33
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2020-43d5a372fc
2020-12-13 02:07:36.430414
--------------------------------------------------------------------------------
Name : nodejs
Product : Fedora 33
Version : 14.15.1
Release : 1.fc33
URL : http://nodejs.org/
Summary : JavaScript runtime
Description :
Node.js is a platform built on Chrome's JavaScript runtime
for easily building fast, scalable network applications.
Node.js uses an event-driven, non-blocking I/O model that
makes it lightweight and efficient, perfect for data-intensive
real-time applications that run across distributed devices.
--------------------------------------------------------------------------------
Update Information:
Update to 14.15.1
--------------------------------------------------------------------------------
ChangeLog:
* Wed Dec 2 2020 Stephen Gallagher - 1:14.15.1-1
- Update to 14.15.1
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1846887 - CVE-2020-10531 nodejs: ICU: Integer overflow in UnicodeString::doAppend() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1846887
[ 2 ] Bug #1846892 - CVE-2020-10531 nodejs:14/nodejs: ICU: Integer overflow in UnicodeString::doAppend() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1846892
[ 3 ] Bug #1847485 - CVE-2020-11080 nodejs:14/nghttp2: overly large SETTINGS frames can lead to DoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1847485
[ 4 ] Bug #1856877 - CVE-2020-15095 nodejs: npm: Sensitive information exposure through logs [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1856877
[ 5 ] Bug #1866840 - CVE-2020-14354 nodejs: c-ares: ares_destroy() with pending ares_getaddrinfo() leads to Use-After-Free [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1866840
[ 6 ] Bug #1879333 - CVE-2020-8251 nodejs: Denial of Service by resource exhaustion CWE-400 due to unfinished HTTP/1.1 requests [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1879333
[ 7 ] Bug #1879334 - CVE-2020-8251 nodejs:14/nodejs: Denial of Service by resource exhaustion CWE-400 due to unfinished HTTP/1.1 requests [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1879334
[ 8 ] Bug #1879336 - CVE-2020-8252 nodejs: libuv: buffer overflow in realpath [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1879336
[ 9 ] Bug #1879341 - CVE-2020-8201 nodejs: HTTP Request Smuggling due to CR-to-Hyphen conversion [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1879341
[ 10 ] Bug #1879342 - CVE-2020-8252 nodejs:14/nodejs: libuv: buffer overflow in realpath [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1879342
[ 11 ] Bug #1879346 - CVE-2020-8201 nodejs:14/nodejs: HTTP Request Smuggling due to CR-to-Hyphen conversion [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1879346
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-43d5a372fc' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
A nodejs security update has been released for Fedora 33.