NodeJS 20.x

Edit Package nodejs20
https://nodejs.org/

LTS codestream

Refresh
Refresh
Source Files
Filename Size Changed
SHASUMS256.txt 0000003777 3.69 KB
SHASUMS256.txt.sig 0000000438 438 Bytes
_constraints 0000000603 603 Bytes
bash_output_helper.bash 0000000306 306 Bytes
c-ares-fixes.patch 0000002068 2.02 KB
cares_public_headers.patch 0000000343 343 Bytes
fix_ci_tests.patch 0000006652 6.5 KB
flaky_test_rerun.patch 0000000670 670 Bytes
gcc13.patch 0000001285 1.25 KB
legacy_python.patch 0000000705 705 Bytes
linker_lto_jobs.patch 0000000752 752 Bytes
manual_configure.patch 0000000760 760 Bytes
node-gyp-addon-gypi.patch 0000003162 3.09 KB
node-gyp-config.patch 0000000591 591 Bytes
node-gyp_7.1.2.tar.xz 0001245896 1.19 MB
node-v20.11.1.tar.xz 0042159296 40.2 MB
node_modules.tar.xz 0001071008 1.02 MB
nodejs-libpath.patch 0000002020 1.97 KB
nodejs.keyring 0000061373 59.9 KB
nodejs20.changes 0000013006 12.7 KB
nodejs20.spec 0000038452 37.6 KB
npm_search_paths.patch 0000001143 1.12 KB
openssl_binary_detection.patch 0000001621 1.58 KB
qemu_timeouts_arches.patch 0000000432 432 Bytes
skip_no_console.patch 0000000973 973 Bytes
sle12_python3_compat.patch 0000001636 1.6 KB
test-skip-y2038-on-32bit-time_t.patch 0000001844 1.8 KB
update_npm_tarball.sh 0000000251 251 Bytes
versioned.patch 0000006446 6.29 KB
Revision 22 (latest revision is 23)
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1147152 from Adam Majer's avatar Adam Majer (adamm) (revision 22)
- Update to 20.11.1: (security updates)
  * (CVE-2024-21892, bsc#1219992) - Code injection and privilege escalation through Linux capabilities- (High)
  * (CVE-2024-22019, bsc#1219993) - http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks- (High)
  * (CVE-2024-21896, bsc#1219994) - Path traversal by monkey-patching Buffer internals- (High)
  * (CVE-2024-22017, bsc#1219995) - setuid() does not drop all privileges due to io_uring - (High)
  * (CVE-2023-46809, bsc#1219997) - Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) - (Medium)
  * (CVE-2024-21891, bsc#1219998) - Multiple permission model bypasses due to improper path traversal sequence sanitization - (Medium)
  * (CVE-2024-21890, bsc#1219999) - Improper handling of wildcards in --allow-fs-read and --allow-fs-write (Medium)
  * (CVE-2024-22025, bsc#1220014) - Denial of Service by resource exhaustion in fetch() brotli decoding - (Medium)
  * undici version 5.28.3 (CVE-2024-24758, bsc#1220017)
  * libuv version 1.48.0 (CVE-2024-24806, bsc#1219724)
Comments 0
openSUSE Build Service is sponsored by