Описание
ELSA-2025-8493: nodejs22 security update (IMPORTANT)
[1:22.16.0-1]
- Update to version 22.16.0
[1:22.15.0-3]
- Make grep Source stricter in nodejs-tarball
[1:22.15.0-2]
- Add unit-test during build for nodejs22
[1:22.15.0-1]
- Update to version 22.15.0
[1:22.13.1-6]
- Update c-ares with fix for CVE-2025-31498
[1:22.13.1-5]
- Revert 'Generate only versioned rpms'
[1:22.13.1-4]
- Use stream-specific ABI dependency generator
[1:22.13.1-3]
- Generate only versioned rpms
Обновленные пакеты
Oracle Linux 10
Oracle Linux aarch64
nodejs
22.16.0-1.el10_0
nodejs-devel
22.16.0-1.el10_0
nodejs-docs
22.16.0-1.el10_0
nodejs-full-i18n
22.16.0-1.el10_0
nodejs-libs
22.16.0-1.el10_0
nodejs-npm
10.9.2-1.22.16.0.1.el10_0
Oracle Linux x86_64
nodejs
22.16.0-1.el10_0
nodejs-devel
22.16.0-1.el10_0
nodejs-docs
22.16.0-1.el10_0
nodejs-full-i18n
22.16.0-1.el10_0
nodejs-libs
22.16.0-1.el10_0
nodejs-npm
10.9.2-1.22.16.0.1.el10_0
Связанные CVE
Связанные уязвимости
In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service. Impact: * This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.