NodeJS 20.x

Edit Package nodejs20
https://nodejs.org/

LTS codestream

Refresh
Refresh
Source Files
Filename Size Changed
SHASUMS256.txt 0000003748 3.66 KB
SHASUMS256.txt.sig 0000000438 438 Bytes
_constraints 0000000603 603 Bytes
bash_output_helper.bash 0000000306 306 Bytes
cares_public_headers.patch 0000000343 343 Bytes
fix_ci_tests.patch 0000004076 3.98 KB
flaky_test_rerun.patch 0000000670 670 Bytes
gcc13.patch 0000001285 1.25 KB
legacy_python.patch 0000000705 705 Bytes
linker_lto_jobs.patch 0000000752 752 Bytes
manual_configure.patch 0000000760 760 Bytes
node-gyp-addon-gypi.patch 0000003135 3.06 KB
node-gyp-config.patch 0000000591 591 Bytes
node-gyp_7.1.2.tar.xz 0001245896 1.19 MB
node-v20.3.1.tar.xz 0041712208 39.8 MB
node_modules.tar.xz 0001071008 1.02 MB
nodejs-libpath.patch 0000002020 1.97 KB
nodejs.keyring 0000055415 54.1 KB
nodejs20.changes 0000004911 4.8 KB
nodejs20.spec 0000039480 38.6 KB
npm_search_paths.patch 0000001143 1.12 KB
openssl_binary_detection.patch 0000001621 1.58 KB
qemu_timeouts_arches.patch 0000000432 432 Bytes
skip_no_console.patch 0000000973 973 Bytes
sle12_python3_compat.patch 0000001636 1.6 KB
test-skip-y2038-on-32bit-time_t.patch 0000001844 1.8 KB
update_npm_tarball.sh 0000000252 252 Bytes
versioned.patch 0000006496 6.34 KB
z13.patch 0000003466 3.38 KB
Revision 7 (latest revision is 23)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1094364 from Adam Majer's avatar Adam Majer (adamm) (revision 7)
- Update to version 20.3.1 (security fixes only). The following
  CVEs are fixed in this release:
  * (CVE-2023-30581, bsc#1212574): mainModule.__proto__ Bypass
    Experimental Policy Mechanism (High)
  * (CVE-2023-30584, bsc#1212575): Path Traversal Bypass in
    Experimental Permission Model (High)
  * (CVE-2023-30587, bsc#1212576): Bypass of Experimental
    Permission Model via Node.js Inspector (High)
  * (CVE-2023-30582, bsc#1212577): Inadequate Permission Model
    Allows Unauthorized File Watching (Medium)
  * (CVE-2023-30583, bsc#1212578): Bypass of Experimental
    Permission Model via fs.openAsBlob() (Medium)
  * (CVE-2023-30585, bsc#1212579): Privilege escalation via
    Malicious Registry Key manipulation during Node.js
    installer repair process (Medium)
  * (CVE-2023-30586, bsc#1212580): Bypass of Experimental
    Permission Model via Arbitrary OpenSSL Engines (Medium)
  * (CVE-2023-30588, bsc#1212581): Process interuption due to invalid
    Public Key information in x509 certificates (Medium)
  * (CVE-2023-30589, bsc#1212582): HTTP Request Smuggling via
    Empty headers separated by CR (Medium)
  * (CVE-2023-30590, bsc#1212583): DiffieHellman does not
    generate keys after setting a private key (Medium)
Comments 0
openSUSE Build Service is sponsored by