Action not permitted
Modal body text goes here.
CVE-2020-8287
Vulnerability from cvelistv5
Published
2021-01-06 00:00
Modified
2024-08-04 09:56
Severity ?
EPSS score ?
Summary
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | https://github.com/nodejs/node |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1002188" }, { "tags": [ "x_transferred" ], "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "name": "DSA-4826", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4826" }, { "name": "FEDORA-2021-fb1a136393", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "name": "GLSA-202101-07", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202101-07" }, { "name": "FEDORA-2021-d5b2c18fe6", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3224-1] http-parser security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/nodejs/node", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in 10.23.1, 12.20.1, 14.15.4, 15.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-444", "description": "HTTP Request Smuggling (CWE-444)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-05T00:00:00", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://hackerone.com/reports/1002188" }, { "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "name": "DSA-4826", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2021/dsa-4826" }, { "name": "FEDORA-2021-fb1a136393", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "name": "GLSA-202101-07", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202101-07" }, { "name": "FEDORA-2021-d5b2c18fe6", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3224-1] http-parser security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8287", "datePublished": "2021-01-06T00:00:00", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:28.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-8287\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2021-01-06T21:15:14.707\",\"lastModified\":\"2023-11-07T03:26:19.870\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.\"},{\"lang\":\"es\",\"value\":\"Node.js versiones anteriores a 10.23.1, 12.20.1, 14.15.4, 15.5.1 permiten dos copias de un campo de encabezado en una petici\u00f3n HTTP (por ejemplo, dos campos de encabezado Transfer-Encoding).\u0026#xa0;En este caso, Node.js identifica el primer campo de encabezado e ignora el segundo.\u0026#xa0;Esto puede conllevar a un Tr\u00e1fico no Autorizado de Peticiones HTTP\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.4},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]},{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.23.1\",\"matchCriteriaId\":\"8042EBD0-9F28-43DF-BF27-DD3BBBD3E017\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.20.1\",\"matchCriteriaId\":\"5E1AAC61-6E2E-46F8-BB51-D615FC87DA3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndExcluding\":\"14.15.4\",\"matchCriteriaId\":\"1DF64627-51CF-41BB-A9D2-B23DAC590FF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndExcluding\":\"15.5.1\",\"matchCriteriaId\":\"B6E4C7D3-2F1D-49B8-95AF-B89D82267ECB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.3.4:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"937F66F5-F5BA-4156-82E0-EB2C99ABD41A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"BC0F8B31-F93B-40B6-9C06-A3996DC63829\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://hackerone.com/reports/1002188\",\"source\":\"support@hackerone.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202101-07\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210212-0003/\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4826\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-f33f-hhx9-6j4m
Vulnerability from github
Published
2022-05-24 17:38
Modified
2022-05-24 17:38
Severity ?
Details
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
{ "affected": [], "aliases": [ "CVE-2020-8287" ], "database_specific": { "cwe_ids": [ "CWE-444" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-01-06T21:15:00Z", "severity": "MODERATE" }, "details": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", "id": "GHSA-f33f-hhx9-6j4m", "modified": "2022-05-24T17:38:08Z", "published": "2022-05-24T17:38:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" }, { "type": "WEB", "url": "https://hackerone.com/reports/1002188" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4" }, { "type": "WEB", "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202101-07" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210212-0003" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4826" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ] }
rhsa-2021_0521
Vulnerability from csaf_redhat
Published
2021-02-15 18:28
Modified
2024-11-15 09:39
Summary
Red Hat Security Advisory: rh-nodejs10-nodejs security update
Notes
Topic
An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.23.1).
Security Fix(es):
* libuv: buffer overflow in realpath (CVE-2020-8252)
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-dot-prop: prototype pollution (CVE-2020-8116)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* npm: sensitive information exposure through logs (CVE-2020-15095)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.23.1).\n\nSecurity Fix(es):\n\n* libuv: buffer overflow in realpath (CVE-2020-8252)\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-dot-prop: prototype pollution (CVE-2020-8116)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* npm: sensitive information exposure through logs (CVE-2020-15095)\n\n* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)\n\n* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0521", "url": "https://access.redhat.com/errata/RHSA-2021:0521" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1840004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004" }, { "category": "external", "summary": "1856875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875" }, { "category": "external", "summary": "1857977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" }, { "category": "external", "summary": "1868196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196" }, { "category": "external", "summary": "1879315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315" }, { "category": "external", "summary": "1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0521.json" } ], "title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update", "tracking": { "current_release_date": "2024-11-15T09:39:32+00:00", "generator": { "date": "2024-11-15T09:39:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0521", "initial_release_date": "2021-02-15T18:28:29+00:00", "revision_history": [ { "date": "2021-02-15T18:28:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-15T18:28:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T09:39:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "product": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "product_id": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "product_id": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "product_id": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.23.1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "product": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "product_id": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.10-10.23.1.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.23.1-2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "product_id": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "product_id": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.23.1-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "product": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "product_id": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.10-10.23.1.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.23.1-2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.23.1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "product": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "product_id": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.10-10.23.1.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.23.1-2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "product": { "name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "product_id": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-docs@10.23.1-2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7608", "cwe": { "id": "CWE-267", "name": "Privilege Defined With Unsafe Actions" }, "discovery_date": "2020-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1840004" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in nodesjs-yargs-parser, where it can be tricked into adding or modifying properties of the Object.prototype using a \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-yargs-parser: prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7608" }, { "category": "external", "summary": "RHBZ#1840004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7608", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608" } ], "release_date": "2020-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-yargs-parser: prototype pollution vulnerability" }, { "cve": "CVE-2020-7754", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1892430" } ], "notes": [ { "category": "description", "text": "This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8 and Software Collections, `npm-user-validate` is used exclusively for `npm`. As a result, this vulnerability is considered Low in such a context.\n\nIn OpenShift Container Platform (OCP) 3.11 and 4.4 the kibana package has been marked Low (similar to RHEL8) as it is primarily used for npm and is protected via OpenShift OAuth. Additionally, whilst OCP 4.4 does deliver the kibana package, due to the code changing to container first content, it has been marked as wontfix at this time and may be fixed in a future release. \n\nAdditionally, the openshift4/ose-logging-kibana6 container is not represented on the CVE page as it gets npm from the Red Hat Software Collections and as such the ose-logging-kibana6 container will be updated when the rh-nodejs10-nodejs package is.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7754" }, { "category": "external", "summary": "RHBZ#1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7754", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754" }, { "category": "external", "summary": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p", "url": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p" } ], "release_date": "2020-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS" }, { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2020-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1898680" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-y18n. There is a prototype pollution vulnerability in y18n\u0027s locale functionality. If an attacker is able to provide untrusted input via locale, they may be able to cause denial of service or in rare circumstances, impact to data integrity or confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-y18n: prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-y18n library to authenticated users only, therefore the impact is Low.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of y18n as a dependency of yargs. However, no unsafe usage found where the module accepts untrusted input and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7774" }, { "category": "external", "summary": "RHBZ#1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" } ], "release_date": "2020-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-y18n: prototype pollution vulnerability" }, { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-8116", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2020-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868196" } ], "notes": [ { "category": "description", "text": "A prototype pollution flaw was found in nodejs-dot-prop. The function set could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ paths. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-dot-prop: prototype pollution", "title": "Vulnerability summary" }, { "category": "other", "text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the grafana and prometheus containers are behind OpenShift OAuth restricting access to the vulnerable dot-prop library to authenticated users only, therefore the impact is Low.\n\nRed Hat Openshift Container Storage 4 is not affected by this vulnerability, as it already includes patched version of dot-prop(v5.2.0) in noobaa-core container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8116" }, { "category": "external", "summary": "RHBZ#1868196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8116", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8116" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116" }, { "category": "external", "summary": "https://hackerone.com/reports/719856", "url": "https://hackerone.com/reports/719856" } ], "release_date": "2020-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-dot-prop: prototype pollution" }, { "cve": "CVE-2020-8252", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879315" } ], "notes": [ { "category": "description", "text": "A flaw has been found in libuv. The realpath() implementation performs an incorrect calculation when allocating a buffer, leading to a potential buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libuv: buffer overflow in realpath", "title": "Vulnerability summary" }, { "category": "other", "text": "As shipped in Red Hat Software Collections (nodejs-10 \u0026 nodejs-12) as well as Red Hat Enterprise Linux 8 (nodejs-10 and nodejs-12), no incorrect use of the `UV__PATH_MAX` macro were found. Although the releases of libuv contained in these versions of nodejs are considered \"Affected\", it is considered not feasible to trigger the flaw.\n\nNodeJS is included in Red Hat Quay as a dependency of Yarn which is only used while building Red Hat Quay, and not during runtime.\n\nRed Hat Enterprise Linux 8 ships libuv-1.23.1, which is not vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8252" }, { "category": "external", "summary": "RHBZ#1879315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8252", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252" } ], "release_date": "2020-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libuv: buffer overflow in realpath" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912854" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: use-after-free in the TLS implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8265" }, { "category": "external", "summary": "RHBZ#1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8265", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "https://hackerone.com/reports/988103", "url": "https://hackerone.com/reports/988103" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: use-after-free in the TLS implementation" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912863" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Affected versions of Node.js allow two copies of a header field in an HTTP request. The first header field is recognized while the second is ignored leading to HTTP request smuggling. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP request smuggling via two copies of a header field in an http request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8287" }, { "category": "external", "summary": "RHBZ#1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8287", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: HTTP request smuggling via two copies of a header field in an http request" }, { "cve": "CVE-2020-15095", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856875" } ], "notes": [ { "category": "description", "text": "Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"\u003cprotocol\u003e://[\u003cuser\u003e[:\u003cpassword\u003e]@]\u003chostname\u003e[:\u003cport\u003e][:][/]\u003cpath\u003e\". The password value is not redacted and is printed to stdout and also to any generated log files.", "title": "Vulnerability description" }, { "category": "summary", "text": "npm: sensitive information exposure through logs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15095" }, { "category": "external", "summary": "RHBZ#1856875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15095", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095" } ], "release_date": "2020-07-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" }, { "category": "workaround", "details": "Do not provide a password to npm via the cli to avoid it from being entered into the logs and stdout, or use ssh instead.", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "npm: sensitive information exposure through logs" }, { "cve": "CVE-2020-15366", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2020-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1857977" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ajv. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function", "title": "Vulnerability summary" }, { "category": "other", "text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-ajv library to authenticated users only, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15366" }, { "category": "external", "summary": "RHBZ#1857977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15366", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-AJV-584908", "url": "https://snyk.io/vuln/SNYK-JS-AJV-584908" } ], "release_date": "2020-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-15T18:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0521" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function" } ] }
rhsa-2021_0421
Vulnerability from csaf_redhat
Published
2021-02-04 17:20
Modified
2024-11-15 09:38
Summary
Red Hat Security Advisory: rh-nodejs14-nodejs security update
Notes
Topic
An update for rh-nodejs14-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.15.4).
Security Fix(es):
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs14-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.15.4).\n\nSecurity Fix(es):\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)\n\n* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0421", "url": "https://access.redhat.com/errata/RHSA-2021:0421" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1857977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" }, { "category": "external", "summary": "1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "1898554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898554" }, { "category": "external", "summary": "1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0421.json" } ], "title": "Red Hat Security Advisory: rh-nodejs14-nodejs security update", "tracking": { "current_release_date": "2024-11-15T09:38:32+00:00", "generator": { "date": "2024-11-15T09:38:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0421", "initial_release_date": "2021-02-04T17:20:51+00:00", "revision_history": [ { "date": "2021-02-04T17:20:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-04T17:20:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T09:38:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "product": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "product_id": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.15.4-2.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "product_id": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.15.4-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "product_id": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.15.4-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "product": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "product_id": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.10-14.15.4.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.15.4-2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "product_id": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.15.4-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "product_id": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.15.4-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "product": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "product_id": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.10-14.15.4.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.15.4-2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.15.4-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.15.4-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "product": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "product_id": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.10-14.15.4.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.15.4-2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "product": { "name": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "product_id": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-docs@14.15.4-2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7754", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1892430" } ], "notes": [ { "category": "description", "text": "This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8 and Software Collections, `npm-user-validate` is used exclusively for `npm`. As a result, this vulnerability is considered Low in such a context.\n\nIn OpenShift Container Platform (OCP) 3.11 and 4.4 the kibana package has been marked Low (similar to RHEL8) as it is primarily used for npm and is protected via OpenShift OAuth. Additionally, whilst OCP 4.4 does deliver the kibana package, due to the code changing to container first content, it has been marked as wontfix at this time and may be fixed in a future release. \n\nAdditionally, the openshift4/ose-logging-kibana6 container is not represented on the CVE page as it gets npm from the Red Hat Software Collections and as such the ose-logging-kibana6 container will be updated when the rh-nodejs10-nodejs package is.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7754" }, { "category": "external", "summary": "RHBZ#1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7754", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754" }, { "category": "external", "summary": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p", "url": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p" } ], "release_date": "2020-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-04T17:20:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0421" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS" }, { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2020-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1898680" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-y18n. There is a prototype pollution vulnerability in y18n\u0027s locale functionality. If an attacker is able to provide untrusted input via locale, they may be able to cause denial of service or in rare circumstances, impact to data integrity or confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-y18n: prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-y18n library to authenticated users only, therefore the impact is Low.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of y18n as a dependency of yargs. However, no unsafe usage found where the module accepts untrusted input and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7774" }, { "category": "external", "summary": "RHBZ#1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" } ], "release_date": "2020-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-04T17:20:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0421" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-y18n: prototype pollution vulnerability" }, { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-04T17:20:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0421" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912854" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: use-after-free in the TLS implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8265" }, { "category": "external", "summary": "RHBZ#1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8265", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "https://hackerone.com/reports/988103", "url": "https://hackerone.com/reports/988103" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-04T17:20:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0421" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: use-after-free in the TLS implementation" }, { "cve": "CVE-2020-8277", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1898554" } ], "notes": [ { "category": "description", "text": "A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions \u003c 15.2.1, \u003c 14.15.1, and \u003c 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8277" }, { "category": "external", "summary": "RHBZ#1898554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8277", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8277" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8277", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8277" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-04T17:20:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0421" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912863" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Affected versions of Node.js allow two copies of a header field in an HTTP request. The first header field is recognized while the second is ignored leading to HTTP request smuggling. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP request smuggling via two copies of a header field in an http request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8287" }, { "category": "external", "summary": "RHBZ#1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8287", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-04T17:20:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0421" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: HTTP request smuggling via two copies of a header field in an http request" }, { "cve": "CVE-2020-15366", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2020-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1857977" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ajv. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function", "title": "Vulnerability summary" }, { "category": "other", "text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-ajv library to authenticated users only, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15366" }, { "category": "external", "summary": "RHBZ#1857977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15366", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-AJV-584908", "url": "https://snyk.io/vuln/SNYK-JS-AJV-584908" } ], "release_date": "2020-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-04T17:20:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0421" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.15.4-2.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.15.4-2.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.10-14.15.4.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function" } ] }
rhsa-2021_0549
Vulnerability from csaf_redhat
Published
2021-02-16 14:25
Modified
2024-11-15 09:38
Summary
Red Hat Security Advisory: nodejs:12 security update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3).
Security Fix(es):
* nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746)
* nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747)
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3).\n\nSecurity Fix(es):\n\n* nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746)\n\n* nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747)\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0549", "url": "https://access.redhat.com/errata/RHSA-2021:0549" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1795475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795475" }, { "category": "external", "summary": "1795479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795479" }, { "category": "external", "summary": "1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0549.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security update", "tracking": { "current_release_date": "2024-11-15T09:38:59+00:00", "generator": { "date": "2024-11-15T09:38:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0549", "initial_release_date": "2021-02-16T14:25:52+00:00", "revision_history": [ { "date": "2021-02-16T14:25:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-16T14:25:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T09:38:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8030020210129141730:229f0a1c", "product": { "name": "nodejs:12:8030020210129141730:229f0a1c", "product_id": "nodejs:12:8030020210129141730:229f0a1c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8030020210129141730:229f0a1c" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "product": { "name": "nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "product_id": "nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B9715%2B1718613f?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_id": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product": { "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_id": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product": { "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_id": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product": { "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_id": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product": { "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_id": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "product": { "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "product_id": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.12.20.1.1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "product": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "product_id": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B9715%2B1718613f?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_id": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_id": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product": { "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_id": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product": { "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_id": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_id": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "product": { "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "product_id": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.12.20.1.1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_id": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product": { "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_id": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product": { "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_id": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product": { "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_id": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product": { "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_id": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "product": { "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "product_id": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.12.20.1.1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_id": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product": { "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_id": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product": { "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_id": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product": { "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_id": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product": { "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_id": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.20.1-1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64", "product": { "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64", "product_id": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.12.20.1.1.module%2Bel8.3.0%2B9503%2B19cb079c?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, "product_reference": "nodejs:12:8030020210129141730:229f0a1c", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64" }, "product_reference": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le" }, "product_reference": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x" }, "product_reference": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src" }, "product_reference": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64" }, "product_reference": "nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x" }, "product_reference": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64" }, "product_reference": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x" }, "product_reference": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64" }, "product_reference": "nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64" }, "product_reference": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le" }, "product_reference": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x" }, "product_reference": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64" }, "product_reference": "nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch" }, "product_reference": "nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x" }, "product_reference": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64" }, "product_reference": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le" }, "product_reference": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x" }, "product_reference": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64 as a component of nodejs:12:8030020210129141730:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" }, "product_reference": "npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3750", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1578246" } ], "notes": [ { "category": "description", "text": "The utilities function in all versions \u003c= 0.5.0 of the deep-extend node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-deep-extend: Prototype pollution can allow attackers to modify object properties", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3750" }, { "category": "external", "summary": "RHBZ#1578246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3750" }, { "category": "external", "summary": "https://hackerone.com/reports/311333", "url": "https://hackerone.com/reports/311333" }, { "category": "external", "summary": "https://nodesecurity.io/advisories/612", "url": "https://nodesecurity.io/advisories/612" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0549" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-deep-extend: Prototype pollution can allow attackers to modify object properties" }, { "cve": "CVE-2019-10746", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2019-08-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1795475" } ], "notes": [ { "category": "description", "text": "A flaw was found in Nodejs\u0027s mixin-deep prior to versions 1.3.2 and 2.0.0. The mixin-deep function could be used to add or modify properties of the Object.prototype. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-mixin-deep: prototype pollution in function mixin-deep", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Software Collections and Red Hat Enterprise Linux 8, nodejs-mixin-deep is bundled into nodejs-nodemon, and is not meant to be accessed outside of that package. Within nodemon, this flaw is rated with a Low severity.\n\nIn Red Hat OpenShift Logging the openshift-logging/kibana6-rhel8 container bundles many nodejs packages as a build time dependencies, including the mixin-deep package. \nThe vulnerable code is not used hence the impact to OpenShift Logging by this vulnerability is Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10746" }, { "category": "external", "summary": "RHBZ#1795475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795475" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10746", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10746" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10746", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10746" } ], "release_date": "2019-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0549" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-mixin-deep: prototype pollution in function mixin-deep" }, { "cve": "CVE-2019-10747", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2019-08-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1795479" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-set-value. The function mixin-deep can be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ payloads. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-set-value: prototype pollution in function set-value", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform (OCP) contains the affected nodejs-set-value code, it\u0027s added as a dependency of Kibana 5. Similar issue about prototype pollution [1] have been fixed, but no known attack vector was found, so we\u0027re rating this issue as Low for OCP. \n\nIn Red Hat Software Collections and Red Hat Enterprise Linux 8, nodejs-set-value is bundled into nodejs-nodemon, and is not meant to be accessed outside of that package. Within nodemon, this flaw is rated with a Low severity.\n\nOpenShift distributed tracing bundles vulnerable version of Nodejs set-value package, however the components are protected by OpenShift OAuth, hence the impact by this vulnerability is reduced to LOW.\n\n[1] CVE-2019-10744 https://www.elastic.co/community/security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10747" }, { "category": "external", "summary": "RHBZ#1795479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795479" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10747", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10747" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10747", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10747" } ], "release_date": "2019-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0549" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-set-value: prototype pollution in function set-value" }, { "cve": "CVE-2020-7754", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1892430" } ], "notes": [ { "category": "description", "text": "This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8 and Software Collections, `npm-user-validate` is used exclusively for `npm`. As a result, this vulnerability is considered Low in such a context.\n\nIn OpenShift Container Platform (OCP) 3.11 and 4.4 the kibana package has been marked Low (similar to RHEL8) as it is primarily used for npm and is protected via OpenShift OAuth. Additionally, whilst OCP 4.4 does deliver the kibana package, due to the code changing to container first content, it has been marked as wontfix at this time and may be fixed in a future release. \n\nAdditionally, the openshift4/ose-logging-kibana6 container is not represented on the CVE page as it gets npm from the Red Hat Software Collections and as such the ose-logging-kibana6 container will be updated when the rh-nodejs10-nodejs package is.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7754" }, { "category": "external", "summary": "RHBZ#1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7754", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754" }, { "category": "external", "summary": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p", "url": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p" } ], "release_date": "2020-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0549" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS" }, { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0549" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912854" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: use-after-free in the TLS implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8265" }, { "category": "external", "summary": "RHBZ#1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8265", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "https://hackerone.com/reports/988103", "url": "https://hackerone.com/reports/988103" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0549" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: use-after-free in the TLS implementation" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912863" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Affected versions of Node.js allow two copies of a header field in an HTTP request. The first header field is recognized while the second is ignored leading to HTTP request smuggling. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP request smuggling via two copies of a header field in an http request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8287" }, { "category": "external", "summary": "RHBZ#1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8287", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0549" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debuginfo-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-debugsource-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-devel-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-docs-1:12.20.1-1.module+el8.3.0+9503+19cb079c.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-full-i18n-1:12.20.1-1.module+el8.3.0+9503+19cb079c.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210129141730:229f0a1c:npm-1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: HTTP request smuggling via two copies of a header field in an http request" } ] }
rhsa-2021_0548
Vulnerability from csaf_redhat
Published
2021-02-16 14:25
Modified
2024-11-15 09:39
Summary
Red Hat Security Advisory: nodejs:10 security update
Notes
Topic
An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.23.1).
Security Fix(es):
* libuv: buffer overflow in realpath (CVE-2020-8252)
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-dot-prop: prototype pollution (CVE-2020-8116)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* npm: sensitive information exposure through logs (CVE-2020-15095)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (10.23.1).\n\nSecurity Fix(es):\n\n* libuv: buffer overflow in realpath (CVE-2020-8252)\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-dot-prop: prototype pollution (CVE-2020-8116)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* npm: sensitive information exposure through logs (CVE-2020-15095)\n\n* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)\n\n* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0548", "url": "https://access.redhat.com/errata/RHSA-2021:0548" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1840004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004" }, { "category": "external", "summary": "1856875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875" }, { "category": "external", "summary": "1857977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" }, { "category": "external", "summary": "1868196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196" }, { "category": "external", "summary": "1879315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315" }, { "category": "external", "summary": "1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0548.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2024-11-15T09:39:41+00:00", "generator": { "date": "2024-11-15T09:39:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0548", "initial_release_date": "2021-02-16T14:25:46+00:00", "revision_history": [ { "date": "2021-02-16T14:25:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-16T14:25:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T09:39:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8030020210118191659:229f0a1c", "product": { "name": "nodejs:10:8030020210118191659:229f0a1c", "product_id": "nodejs:10:8030020210118191659:229f0a1c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8030020210118191659:229f0a1c" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "product": { "name": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "product_id": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product": { "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_id": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product": { "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_id": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product": { "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_id": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product": { "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_id": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "product": { "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "product_id": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.10.23.1.1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "product": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_id": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product": { "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_id": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product": { "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_id": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product": { "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_id": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "product": { "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "product_id": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.10.23.1.1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product": { "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_id": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product": { "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_id": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product": { "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_id": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product": { "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_id": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "product": { "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "product_id": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.10.23.1.1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product": { "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_id": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product": { "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_id": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product": { "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_id": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product": { "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_id": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64", "product": { "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64", "product_id": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.10.23.1.1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, "product_reference": "nodejs:10:8030020210118191659:229f0a1c", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64" }, "product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le" }, "product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x" }, "product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src" }, "product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64" }, "product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x" }, "product_reference": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64" }, "product_reference": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x" }, "product_reference": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64" }, "product_reference": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64" }, "product_reference": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le" }, "product_reference": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x" }, "product_reference": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64" }, "product_reference": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch" }, "product_reference": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64" }, "product_reference": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le" }, "product_reference": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x" }, "product_reference": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64" }, "product_reference": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64" }, "product_reference": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le" }, "product_reference": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x" }, "product_reference": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64 as a component of nodejs:10:8030020210118191659:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" }, "product_reference": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7608", "cwe": { "id": "CWE-267", "name": "Privilege Defined With Unsafe Actions" }, "discovery_date": "2020-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1840004" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in nodesjs-yargs-parser, where it can be tricked into adding or modifying properties of the Object.prototype using a \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-yargs-parser: prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7608" }, { "category": "external", "summary": "RHBZ#1840004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7608", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608" } ], "release_date": "2020-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-yargs-parser: prototype pollution vulnerability" }, { "cve": "CVE-2020-7754", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1892430" } ], "notes": [ { "category": "description", "text": "This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8 and Software Collections, `npm-user-validate` is used exclusively for `npm`. As a result, this vulnerability is considered Low in such a context.\n\nIn OpenShift Container Platform (OCP) 3.11 and 4.4 the kibana package has been marked Low (similar to RHEL8) as it is primarily used for npm and is protected via OpenShift OAuth. Additionally, whilst OCP 4.4 does deliver the kibana package, due to the code changing to container first content, it has been marked as wontfix at this time and may be fixed in a future release. \n\nAdditionally, the openshift4/ose-logging-kibana6 container is not represented on the CVE page as it gets npm from the Red Hat Software Collections and as such the ose-logging-kibana6 container will be updated when the rh-nodejs10-nodejs package is.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7754" }, { "category": "external", "summary": "RHBZ#1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7754", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754" }, { "category": "external", "summary": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p", "url": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p" } ], "release_date": "2020-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS" }, { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2020-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1898680" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-y18n. There is a prototype pollution vulnerability in y18n\u0027s locale functionality. If an attacker is able to provide untrusted input via locale, they may be able to cause denial of service or in rare circumstances, impact to data integrity or confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-y18n: prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-y18n library to authenticated users only, therefore the impact is Low.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of y18n as a dependency of yargs. However, no unsafe usage found where the module accepts untrusted input and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7774" }, { "category": "external", "summary": "RHBZ#1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" } ], "release_date": "2020-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-y18n: prototype pollution vulnerability" }, { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-8116", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2020-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868196" } ], "notes": [ { "category": "description", "text": "A prototype pollution flaw was found in nodejs-dot-prop. The function set could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ paths. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-dot-prop: prototype pollution", "title": "Vulnerability summary" }, { "category": "other", "text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the grafana and prometheus containers are behind OpenShift OAuth restricting access to the vulnerable dot-prop library to authenticated users only, therefore the impact is Low.\n\nRed Hat Openshift Container Storage 4 is not affected by this vulnerability, as it already includes patched version of dot-prop(v5.2.0) in noobaa-core container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8116" }, { "category": "external", "summary": "RHBZ#1868196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8116", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8116" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116" }, { "category": "external", "summary": "https://hackerone.com/reports/719856", "url": "https://hackerone.com/reports/719856" } ], "release_date": "2020-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-dot-prop: prototype pollution" }, { "cve": "CVE-2020-8252", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879315" } ], "notes": [ { "category": "description", "text": "A flaw has been found in libuv. The realpath() implementation performs an incorrect calculation when allocating a buffer, leading to a potential buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libuv: buffer overflow in realpath", "title": "Vulnerability summary" }, { "category": "other", "text": "As shipped in Red Hat Software Collections (nodejs-10 \u0026 nodejs-12) as well as Red Hat Enterprise Linux 8 (nodejs-10 and nodejs-12), no incorrect use of the `UV__PATH_MAX` macro were found. Although the releases of libuv contained in these versions of nodejs are considered \"Affected\", it is considered not feasible to trigger the flaw.\n\nNodeJS is included in Red Hat Quay as a dependency of Yarn which is only used while building Red Hat Quay, and not during runtime.\n\nRed Hat Enterprise Linux 8 ships libuv-1.23.1, which is not vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8252" }, { "category": "external", "summary": "RHBZ#1879315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8252", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252" } ], "release_date": "2020-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libuv: buffer overflow in realpath" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912854" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: use-after-free in the TLS implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8265" }, { "category": "external", "summary": "RHBZ#1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8265", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "https://hackerone.com/reports/988103", "url": "https://hackerone.com/reports/988103" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: use-after-free in the TLS implementation" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912863" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Affected versions of Node.js allow two copies of a header field in an HTTP request. The first header field is recognized while the second is ignored leading to HTTP request smuggling. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP request smuggling via two copies of a header field in an http request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8287" }, { "category": "external", "summary": "RHBZ#1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8287", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: HTTP request smuggling via two copies of a header field in an http request" }, { "cve": "CVE-2020-15095", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856875" } ], "notes": [ { "category": "description", "text": "Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"\u003cprotocol\u003e://[\u003cuser\u003e[:\u003cpassword\u003e]@]\u003chostname\u003e[:\u003cport\u003e][:][/]\u003cpath\u003e\". The password value is not redacted and is printed to stdout and also to any generated log files.", "title": "Vulnerability description" }, { "category": "summary", "text": "npm: sensitive information exposure through logs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15095" }, { "category": "external", "summary": "RHBZ#1856875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15095", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095" } ], "release_date": "2020-07-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" }, { "category": "workaround", "details": "Do not provide a password to npm via the cli to avoid it from being entered into the logs and stdout, or use ssh instead.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "npm: sensitive information exposure through logs" }, { "cve": "CVE-2020-15366", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2020-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1857977" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ajv. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function", "title": "Vulnerability summary" }, { "category": "other", "text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-ajv library to authenticated users only, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15366" }, { "category": "external", "summary": "RHBZ#1857977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15366", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-AJV-584908", "url": "https://snyk.io/vuln/SNYK-JS-AJV-584908" } ], "release_date": "2020-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210118191659:229f0a1c:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function" } ] }
rhsa-2021_0551
Vulnerability from csaf_redhat
Published
2021-02-16 14:28
Modified
2024-11-15 09:39
Summary
Red Hat Security Advisory: nodejs:14 security and bug fix update
Notes
Topic
An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.15.4).
Security Fix(es):
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* yarn install crashes with nodejs:14 on aarch64 (BZ#1916465)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (14.15.4).\n\nSecurity Fix(es):\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)\n\n* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* yarn install crashes with nodejs:14 on aarch64 (BZ#1916465)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0551", "url": "https://access.redhat.com/errata/RHSA-2021:0551" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1857977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" }, { "category": "external", "summary": "1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "1898554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898554" }, { "category": "external", "summary": "1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0551.json" } ], "title": "Red Hat Security Advisory: nodejs:14 security and bug fix update", "tracking": { "current_release_date": "2024-11-15T09:39:08+00:00", "generator": { "date": "2024-11-15T09:39:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0551", "initial_release_date": "2021-02-16T14:28:03+00:00", "revision_history": [ { "date": "2021-02-16T14:28:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-16T14:28:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T09:39:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:14:8030020210126165503:229f0a1c", "product": { "name": "nodejs:14:8030020210126165503:229f0a1c", "product_id": "nodejs:14:8030020210126165503:229f0a1c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@14:8030020210126165503:229f0a1c" } } }, { "category": "product_version", "name": "nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "product": { "name": "nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "product_id": "nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product_id": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_id": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product": { "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_id": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product": { "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_id": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product": { "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_id": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product": { "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_id": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "product": { "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "product_id": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.14.15.4.2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "product": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "product_id": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product_id": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_id": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product": { "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_id": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product": { "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_id": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product": { "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_id": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product": { "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_id": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "product": { "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_id": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.14.15.4.2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_id": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product": { "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_id": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product": { "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_id": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product": { "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_id": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product": { "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_id": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "product": { "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "product_id": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.14.15.4.2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_id": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product": { "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_id": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product": { "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_id": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product": { "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_id": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product": { "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_id": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.15.4-2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64", "product": { "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64", "product_id": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.10-1.14.15.4.2.module%2Bel8.3.0%2B9635%2Bffdf8381?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, "product_reference": "nodejs:14:8030020210126165503:229f0a1c", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64" }, "product_reference": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le" }, "product_reference": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x" }, "product_reference": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src" }, "product_reference": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64" }, "product_reference": "nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64" }, "product_reference": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le" }, "product_reference": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x" }, "product_reference": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64" }, "product_reference": "nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64" }, "product_reference": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le" }, "product_reference": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x" }, "product_reference": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64" }, "product_reference": "nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64" }, "product_reference": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le" }, "product_reference": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x" }, "product_reference": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64" }, "product_reference": "nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch" }, "product_reference": "nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64" }, "product_reference": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le" }, "product_reference": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x" }, "product_reference": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64" }, "product_reference": "nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch" }, "product_reference": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src" }, "product_reference": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64" }, "product_reference": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le" }, "product_reference": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x" }, "product_reference": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64 as a component of nodejs:14:8030020210126165503:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" }, "product_reference": "npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7754", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1892430" } ], "notes": [ { "category": "description", "text": "This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8 and Software Collections, `npm-user-validate` is used exclusively for `npm`. As a result, this vulnerability is considered Low in such a context.\n\nIn OpenShift Container Platform (OCP) 3.11 and 4.4 the kibana package has been marked Low (similar to RHEL8) as it is primarily used for npm and is protected via OpenShift OAuth. Additionally, whilst OCP 4.4 does deliver the kibana package, due to the code changing to container first content, it has been marked as wontfix at this time and may be fixed in a future release. \n\nAdditionally, the openshift4/ose-logging-kibana6 container is not represented on the CVE page as it gets npm from the Red Hat Software Collections and as such the ose-logging-kibana6 container will be updated when the rh-nodejs10-nodejs package is.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7754" }, { "category": "external", "summary": "RHBZ#1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7754", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754" }, { "category": "external", "summary": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p", "url": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p" } ], "release_date": "2020-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0551" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS" }, { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2020-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1898680" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-y18n. There is a prototype pollution vulnerability in y18n\u0027s locale functionality. If an attacker is able to provide untrusted input via locale, they may be able to cause denial of service or in rare circumstances, impact to data integrity or confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-y18n: prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-y18n library to authenticated users only, therefore the impact is Low.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of y18n as a dependency of yargs. However, no unsafe usage found where the module accepts untrusted input and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7774" }, { "category": "external", "summary": "RHBZ#1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" } ], "release_date": "2020-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0551" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-y18n: prototype pollution vulnerability" }, { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0551" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912854" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: use-after-free in the TLS implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8265" }, { "category": "external", "summary": "RHBZ#1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8265", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "https://hackerone.com/reports/988103", "url": "https://hackerone.com/reports/988103" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0551" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: use-after-free in the TLS implementation" }, { "cve": "CVE-2020-8277", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1898554" } ], "notes": [ { "category": "description", "text": "A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions \u003c 15.2.1, \u003c 14.15.1, and \u003c 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8277" }, { "category": "external", "summary": "RHBZ#1898554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8277", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8277" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8277", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8277" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0551" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912863" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Affected versions of Node.js allow two copies of a header field in an HTTP request. The first header field is recognized while the second is ignored leading to HTTP request smuggling. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP request smuggling via two copies of a header field in an http request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8287" }, { "category": "external", "summary": "RHBZ#1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8287", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0551" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: HTTP request smuggling via two copies of a header field in an http request" }, { "cve": "CVE-2020-15366", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2020-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1857977" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ajv. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function", "title": "Vulnerability summary" }, { "category": "other", "text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-ajv library to authenticated users only, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15366" }, { "category": "external", "summary": "RHBZ#1857977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15366", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-AJV-584908", "url": "https://snyk.io/vuln/SNYK-JS-AJV-584908" } ], "release_date": "2020-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0551" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debuginfo-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-debugsource-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-devel-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-docs-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-full-i18n-1:14.15.4-2.module+el8.3.0+9635+ffdf8381.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210126165503:229f0a1c:npm-1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function" } ] }
rhsa-2021_0485
Vulnerability from csaf_redhat
Published
2021-02-11 13:37
Modified
2024-11-15 09:39
Summary
Red Hat Security Advisory: rh-nodejs12-nodejs security update
Notes
Topic
An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.20.1), rh-nodejs12-nodejs-nodemon (2.0.3).
Security Fix(es):
* nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746)
* nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747)
* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)
* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)
* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.20.1), rh-nodejs12-nodejs-nodemon (2.0.3).\n\nSecurity Fix(es):\n\n* nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746)\n\n* nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747)\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0485", "url": "https://access.redhat.com/errata/RHSA-2021:0485" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1795475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795475" }, { "category": "external", "summary": "1795479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795479" }, { "category": "external", "summary": "1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0485.json" } ], "title": "Red Hat Security Advisory: rh-nodejs12-nodejs security update", "tracking": { "current_release_date": "2024-11-15T09:39:24+00:00", "generator": { "date": "2024-11-15T09:39:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0485", "initial_release_date": "2021-02-11T13:37:42+00:00", "revision_history": [ { "date": "2021-02-11T13:37:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-11T13:37:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T09:39:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "product": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "product_id": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "product": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "product_id": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.20.1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "product": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "product_id": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.10-12.20.1.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.20.1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.20.1-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "product": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "product_id": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.10-12.20.1.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.20.1-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.20.1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "product": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "product_id": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.10-12.20.1.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.20.1-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "product": { "name": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "product_id": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.20.1-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "product": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "product_id": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3750", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1578246" } ], "notes": [ { "category": "description", "text": "The utilities function in all versions \u003c= 0.5.0 of the deep-extend node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-deep-extend: Prototype pollution can allow attackers to modify object properties", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3750" }, { "category": "external", "summary": "RHBZ#1578246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3750" }, { "category": "external", "summary": "https://hackerone.com/reports/311333", "url": "https://hackerone.com/reports/311333" }, { "category": "external", "summary": "https://nodesecurity.io/advisories/612", "url": "https://nodesecurity.io/advisories/612" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-11T13:37:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0485" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-deep-extend: Prototype pollution can allow attackers to modify object properties" }, { "cve": "CVE-2019-10746", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2019-08-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1795475" } ], "notes": [ { "category": "description", "text": "A flaw was found in Nodejs\u0027s mixin-deep prior to versions 1.3.2 and 2.0.0. The mixin-deep function could be used to add or modify properties of the Object.prototype. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-mixin-deep: prototype pollution in function mixin-deep", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Software Collections and Red Hat Enterprise Linux 8, nodejs-mixin-deep is bundled into nodejs-nodemon, and is not meant to be accessed outside of that package. Within nodemon, this flaw is rated with a Low severity.\n\nIn Red Hat OpenShift Logging the openshift-logging/kibana6-rhel8 container bundles many nodejs packages as a build time dependencies, including the mixin-deep package. \nThe vulnerable code is not used hence the impact to OpenShift Logging by this vulnerability is Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10746" }, { "category": "external", "summary": "RHBZ#1795475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795475" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10746", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10746" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10746", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10746" } ], "release_date": "2019-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-11T13:37:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0485" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-mixin-deep: prototype pollution in function mixin-deep" }, { "cve": "CVE-2019-10747", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2019-08-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1795479" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-set-value. The function mixin-deep can be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ payloads. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-set-value: prototype pollution in function set-value", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform (OCP) contains the affected nodejs-set-value code, it\u0027s added as a dependency of Kibana 5. Similar issue about prototype pollution [1] have been fixed, but no known attack vector was found, so we\u0027re rating this issue as Low for OCP. \n\nIn Red Hat Software Collections and Red Hat Enterprise Linux 8, nodejs-set-value is bundled into nodejs-nodemon, and is not meant to be accessed outside of that package. Within nodemon, this flaw is rated with a Low severity.\n\nOpenShift distributed tracing bundles vulnerable version of Nodejs set-value package, however the components are protected by OpenShift OAuth, hence the impact by this vulnerability is reduced to LOW.\n\n[1] CVE-2019-10744 https://www.elastic.co/community/security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10747" }, { "category": "external", "summary": "RHBZ#1795479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795479" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10747", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10747" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10747", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10747" } ], "release_date": "2019-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-11T13:37:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0485" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-set-value: prototype pollution in function set-value" }, { "cve": "CVE-2020-7754", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1892430" } ], "notes": [ { "category": "description", "text": "This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8 and Software Collections, `npm-user-validate` is used exclusively for `npm`. As a result, this vulnerability is considered Low in such a context.\n\nIn OpenShift Container Platform (OCP) 3.11 and 4.4 the kibana package has been marked Low (similar to RHEL8) as it is primarily used for npm and is protected via OpenShift OAuth. Additionally, whilst OCP 4.4 does deliver the kibana package, due to the code changing to container first content, it has been marked as wontfix at this time and may be fixed in a future release. \n\nAdditionally, the openshift4/ose-logging-kibana6 container is not represented on the CVE page as it gets npm from the Red Hat Software Collections and as such the ose-logging-kibana6 container will be updated when the rh-nodejs10-nodejs package is.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7754" }, { "category": "external", "summary": "RHBZ#1892430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7754", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754" }, { "category": "external", "summary": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p", "url": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p" } ], "release_date": "2020-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-11T13:37:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0485" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS" }, { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-11T13:37:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0485" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912854" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: use-after-free in the TLS implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8265" }, { "category": "external", "summary": "RHBZ#1912854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8265", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "https://hackerone.com/reports/988103", "url": "https://hackerone.com/reports/988103" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-11T13:37:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0485" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: use-after-free in the TLS implementation" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912863" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Affected versions of Node.js allow two copies of a header field in an HTTP request. The first header field is recognized while the second is ignored leading to HTTP request smuggling. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP request smuggling via two copies of a header field in an http request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8287" }, { "category": "external", "summary": "RHBZ#1912863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8287", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" } ], "release_date": "2021-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-11T13:37:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0485" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.20.1-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.20.1-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-nodemon-0:2.0.3-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.10-12.20.1.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: HTTP request smuggling via two copies of a header field in an http request" } ] }
icsa-22-069-09
Vulnerability from csaf_cisa
Published
2022-03-10 00:00
Modified
2022-03-10 00:00
Summary
Siemens SINEC INS
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of this vulnerability in third-party components could allow an attacker to interfere with the affected product in various ways.
Critical infrastructure sectors
Energy
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Exploitability
No known public exploits specifically target this vulnerability.
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability in third-party components could allow an attacker to interfere with the affected product in various ways.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-389290.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-069-09 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-069-09.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-069-09 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-09" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-389290.txt" } ], "title": "Siemens SINEC INS", "tracking": { "current_release_date": "2022-03-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-069-09", "initial_release_date": "2022-03-10T00:00:00.000000Z", "revision_history": [ { "date": "2022-03-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-069-09 Siemens SINEC INS" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V1.0.1.1", "product": { "name": "SINEC INS", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SINEC INS" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19242", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19242 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19242 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19242.json" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19242" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19244" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19317" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19603" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19645" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19646" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19880" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19924" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8169" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8177" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8231" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8284" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8285" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8286" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8625" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9327" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11655" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11656" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13630" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13631" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13632" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13871" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15358" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22876" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22890" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22897" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22898" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22901" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22921" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22922" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22923" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22924" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22925" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22926" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25214" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25215" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25216" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25219" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37713" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39134" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39135" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19242" }, { "cve": "CVE-2019-19244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19244 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19244 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19244.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19244" }, { "cve": "CVE-2019-19317", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19317 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19317 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19317.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19317" }, { "cve": "CVE-2019-19603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19603 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19603 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19603.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19603" }, { "cve": "CVE-2019-19645", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19645 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19645 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19645.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19645" }, { "cve": "CVE-2019-19646", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19646 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19646 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19646.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19646" }, { "cve": "CVE-2019-19880", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19880 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19880 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19880.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19880" }, { "cve": "CVE-2019-19923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19923 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19923 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19923.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19923" }, { "cve": "CVE-2019-19924", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19924 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19924 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19924.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19924" }, { "cve": "CVE-2019-19925", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19925 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19925 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19925.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19925" }, { "cve": "CVE-2019-19926", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19926 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19926 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19926.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19926" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-1971 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-1971 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-1971.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "notes": [ { "category": "summary", "text": "This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require(\u0027y18n\u0027)(); y18n.setLocale(\u0027PROTO\u0027); y18n.updateLocale({polluted: true}); console.log(polluted); // true", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-7774 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-7774 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-7774.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-7774" }, { "cve": "CVE-2020-8169", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8169 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8169 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8169.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8177 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8177 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8177.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8231 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8231 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8231.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8265 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8265 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8265.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8265" }, { "cve": "CVE-2020-8284", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8284 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8284 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8284.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8285 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8285 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8285.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8286 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8286 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8286.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8287 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8287 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8287.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8287" }, { "cve": "CVE-2020-8625", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -\u003e 9.11.27, 9.12.0 -\u003e 9.16.11, and versions BIND 9.11.3-S1 -\u003e 9.11.27-S1 and 9.16.8-S1 -\u003e 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8625 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8625 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8625.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8625" }, { "cve": "CVE-2020-9327", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-9327 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-9327 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-9327.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-9327" }, { "cve": "CVE-2020-11655", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-11655 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-11655 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11655.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-11656 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-11656 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11656.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-11656" }, { "cve": "CVE-2020-13630", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13630 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13630 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13630.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13631 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13631 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13631.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13632 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13632 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13632.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13632" }, { "cve": "CVE-2020-13871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13871 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13871 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13871.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13871" }, { "cve": "CVE-2020-15358", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-15358 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-15358 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15358.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-15358" }, { "cve": "CVE-2020-27304", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-27304 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-27304 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-27304" }, { "cve": "CVE-2021-3449", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3449 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3449 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3449.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3450 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3450 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3450.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3672 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3672 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3672.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3672" }, { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3711 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3711 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3711.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3712 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3712 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3712.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3712" }, { "cve": "CVE-2021-22876", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22876 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22876 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22876.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an \u0027unknownProtocol\u0027 are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22883 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22883 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22883.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22883" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22884 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22884 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22884.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22884" }, { "cve": "CVE-2021-22890", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22890 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22890 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22890.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22897 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22897 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22897.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22898 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22898 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22898.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22901 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22901 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22901.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22918", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22918 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22918 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22918.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22918" }, { "cve": "CVE-2021-22921", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22921 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22921 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22921.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22921" }, { "cve": "CVE-2021-22922", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22922 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22922 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22922.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22923 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22923 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22923.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths _case insensitively_,which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22924 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22924 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22924.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22925 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22925 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22925.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT option (--cert with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22926 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22926 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22926.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22930 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22930 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22930.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22930" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22931 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22931 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22931.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22931" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "If the Node.js https API was used incorrectly and \"undefined\" was in passed for the \"rejectUnauthorized\" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22939 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22939 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22939.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22939" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22940 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22940 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22940.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22940" }, { "cve": "CVE-2021-22945", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it _again_.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22945 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22945 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22945.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations WITHOUTTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22946 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22946 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22946.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got _before_ the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22947 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22947 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22947.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23362", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-23362 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-23362 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23362.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-23362" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-23840 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-23840 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23840.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-23840" }, { "cve": "CVE-2021-25214", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.8.5 -\u003e 9.8.8, 9.9.3 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25214 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25214 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25214.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25214" }, { "cve": "CVE-2021-25215", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.0.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25215 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25215 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25215.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25215" }, { "cve": "CVE-2021-25216", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.5.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.11.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25216 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25216 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25216.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25216" }, { "cve": "CVE-2021-25219", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In BIND 9.3.0 -\u003e 9.11.35, 9.12.0 -\u003e 9.16.21, and versions 9.9.3-S1 -\u003e 9.11.35-S1 and 9.16.8-S1 -\u003e 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25219 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25219 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25219.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25219" }, { "cve": "CVE-2021-27290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-27290 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-27290 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-27290.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-27290" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the node-tar directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where node-tar checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-32803 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-32803 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32803.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths flag is not set to true. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc would turn into home/user/.bashrc. This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc. node-tar would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry.path or a filter method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-32804 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-32804 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32804.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-37701", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both \\ and / characters as path separators, however \\ is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at FOO, followed by a symbolic link named foo, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the FOO directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37701 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37701 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37701.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37712 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37712 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37712.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain .. path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as C:some\\path. If the drive letter does not match the extraction target, for example D:\\extraction\\dir, then the result of path.resolve(extractionDirectory, entryPath) would resolve against the current working directory on the C: drive, rather than the extraction target directory. Additionally, a .. portion of the path could occur immediately after the drive letter, such as C:../foo, and was not properly sanitized by the logic that checked for .. within the normalized and split portions of the path. This only affects users of node-tar on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37713 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37713 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37713.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37713" }, { "cve": "CVE-2021-39134", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "summary", "text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in package.json manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist\u0027s internal data structure saw them as separate items that could coexist within the same level in the node_modules hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as file:/some/path, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package pwn-a could define a dependency in their package.json file such as \"foo\": \"file:/some/path\". Another package, pwn-b could define a dependency such as FOO: \"file:foo.tgz\". On case-insensitive file systems, if pwn-a was installed, and then pwn-b was installed afterwards, the contents of foo.tgz would be written to /some/path, and any existing contents of /some/path would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39134 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-39134 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39134.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39134" }, { "cve": "CVE-2021-39135", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "summary", "text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project\u0027s node_modules folder. If the node_modules folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a node_modules symbolic link would have to be employed. 1. A preinstall script could replace node_modules with a symlink. (This is prevented by using --ignore-scripts.) 2. An attacker could supply the target with a git repository, instructing them to run npm install --ignore-scripts in the root. This may be successful, because npm install --ignore-scripts is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39135 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-39135 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39135.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39135" } ] }
icsa-22-111-03
Vulnerability from csaf_cisa
Published
2022-04-21 00:00
Modified
2022-04-21 00:00
Summary
Hitachi Energy MicroSCADA Pro/X SYS600
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could allow an attacker to eavesdrop on traffic between network source and destination, gain unauthorized access to information, or cause a denial-of-service condition.
Critical infrastructure sectors
Energy
Countries/areas deployed
Worldwide
Company headquarters location
Switzerland
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to eavesdrop on traffic between network source and destination, gain unauthorized access to information, or cause a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-111-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-111-03.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-111-03 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-111-03" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Hitachi Energy MicroSCADA Pro/X SYS600", "tracking": { "current_release_date": "2022-04-21T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-111-03", "initial_release_date": "2022-04-21T00:00:00.000000Z", "revision_history": [ { "date": "2022-04-21T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-111-03 Hitachi Energy MicroSCADA ProX SYS600" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 10.1.1", "product": { "name": " SYS600: Versions 10.1.1 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": " SYS600" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=9.4 FP1 | \u003e= 10.2.1", "product": { "name": " SYS600: Versions 10.1.1 and prior", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": " SYS600" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 10.0.0 | \u003c= 10.2.1", "product": { "name": " SYS600: Versions 10.1.1 and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": " SYS600" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1968", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The Raccoon attack exploits a flaw in the TLS specification that can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. This would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note this vulnerability only impacts DH ciphersuites and not ECDH ciphersuites. This vulnerability affects OpenSSL 1.0.2, which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).CVE-2020-1968 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1968" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling.CVE-2020-8265 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling.CVE-2020-8287 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8287" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8201", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js \u003c 12.18.4 and \u003c 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack is possible due to a bug in processing of carrier-return symbols in the HTTP header names.CVE-2020-8201 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8201" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8252", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The implementation of realpath in libuv \u003c 10.22.1, \u003c 12.18.4, and \u003c 14.9.0 used within Node.js incorrectly determined the buffer size, which can result in a buffer overflow if the resolved path is longer than 256 bytes.CVE-2020-8252 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8252" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8172", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0.CVE-2020-8172 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8172" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "napi_get_value_string_*() allows various kinds of memory corruption in node \u003c 10.21.0, 12.18.0, and \u003c 14.4.0.CVE-2020-8174 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8174" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2021-32027", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in postgresql in versions prior to 13.3, 12.7, 11.12, 10.17, and 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.CVE-2021-32027 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32027" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2021-32028", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.CVE-2021-32028 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32028" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] } ] }
wid-sec-w-2022-1000
Vulnerability from csaf_certbund
Published
2021-01-04 23:00
Modified
2023-09-18 22:00
Summary
Node.js: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um einen Denial of Service Angriff oder ein "HTTP request smuggling" durchzuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um einen Denial of Service Angriff oder ein \"HTTP request smuggling\" durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1000 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-1000.json" }, { "category": "self", "summary": "WID-SEC-2022-1000 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1000" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6380-1 vom 2023-09-19", "url": "https://ubuntu.com/security/notices/USN-6380-1" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-110 vom 2023-02-28", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-110/index.html" }, { "category": "external", "summary": "Node.js Security Releases vom 2021-01-04", "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases" }, { "category": "external", "summary": "PoC CVE-2020-8265 vom 2021-01-05", "url": "https://packetstormsecurity.com/files/160807" }, { "category": "external", "summary": "Debian Security Advisory DSA-4826 vom 2021-01-07", "url": "https://www.debian.org/security/2021/dsa-4826" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202101-07 vom 2021-01-11", "url": "https://security.gentoo.org/glsa/202101-07" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0062-1 vom 2021-01-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0068-1 vom 2021-01-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0060-1 vom 2021-01-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0061-1 vom 2021-01-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202101-16 vom 2021-01-13", "url": "https://security.archlinux.org/ASA-202101-16/generate" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0082-1 vom 2021-01-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202101-15 vom 2021-01-13", "url": "https://security.archlinux.org/ASA-202101-15/generate" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202101-14 vom 2021-01-13", "url": "https://security.archlinux.org/ASA-202101-14/generate" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202101-13 vom 2021-01-13", "url": "https://security.archlinux.org/ASA-202101-13/generate" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0107-1 vom 2021-01-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008192.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0121-1 vom 2021-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008198.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0037 vom 2021-01-18", "url": "https://access.redhat.com/errata/RHSA-2021:0038" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0224-1 vom 2021-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008247.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0421 vom 2021-02-04", "url": "https://access.redhat.com/errata/RHSA-2021:0421" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0485 vom 2021-02-11", "url": "https://access.redhat.com/errata/RHSA-2021:0485" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0521 vom 2021-02-15", "url": "https://access.redhat.com/errata/RHSA-2021:0521" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0548 vom 2021-02-16", "url": "https://access.redhat.com/errata/RHSA-2021:0548" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0549 vom 2021-02-16", "url": "https://access.redhat.com/errata/RHSA-2021:0549" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0551 vom 2021-02-16", "url": "https://access.redhat.com/errata/RHSA-2021:0551" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0548 vom 2021-02-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0548.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0549 vom 2021-02-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0549.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0551 vom 2021-02-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0551.html" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04141en_us" }, { "category": "external", "summary": "HCL Article KB0090800 vom 2021-08-03", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0090800" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5563-1 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5563-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-3224 vom 2022-12-05", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html" } ], "source_lang": "en-US", "title": "Node.js: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-09-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:55:21.720+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1000", "initial_release_date": "2021-01-04T23:00:00.000+00:00", "revision_history": [ { "date": "2021-01-04T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-01-05T23:00:00.000+00:00", "number": "2", "summary": "PoC f\u00fcr CVE-2020-8265 aufgenommen" }, { "date": "2021-01-07T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-01-10T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2021-01-11T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-01-12T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Arch Linux und SUSE aufgenommen" }, { "date": "2021-01-13T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-01-14T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-01-18T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-01-26T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-02-04T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-02-11T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-02-15T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-02-16T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-02-21T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-07-25T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2021-08-02T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-08-10T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-12-05T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-02-27T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2023-09-18T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "21" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HCL BigFix", "product": { "name": "HCL BigFix", "product_id": "T017494", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T002194", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:2620" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center Analyzer \u003c 10.9.1-00", "product": { "name": "Hitachi Ops Center Analyzer \u003c 10.9.1-00", "product_id": "T026522", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:analyzer__10.9.1-00" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "branches": [ { "category": "product_name", "name": "Open Source Node.js \u003c 10.23.1", "product": { "name": "Open Source Node.js \u003c 10.23.1", "product_id": "T017989", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:10.23.1" } } }, { "category": "product_name", "name": "Open Source Node.js \u003c 12.20.1", "product": { "name": "Open Source Node.js \u003c 12.20.1", "product_id": "T017990", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:12.20.1" } } }, { "category": "product_name", "name": "Open Source Node.js \u003c 14.15.4", "product": { "name": "Open Source Node.js \u003c 14.15.4", "product_id": "T017991", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:14.15.4" } } }, { "category": "product_name", "name": "Open Source Node.js \u003c 15.5.1", "product": { "name": "Open Source Node.js \u003c 15.5.1", "product_id": "T017992", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:15.5.1" } } } ], "category": "product_name", "name": "Node.js" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js in der genutzten OpenSSL-Bibliothek. Ein Angreifer kann eine NULL-Pointer-Dereferenzierung ausnutzen, um OpenSSL \u00fcber Node.js zum Absturz zu bringen und damit einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T002194", "2951", "T002207", "67646", "T000126", "T015844", "T013312", "T026522", "T012167", "T004914", "T017494" ] }, "release_date": "2021-01-04T23:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-8265", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js innerhalb der TLS-Implementierung. Sie besteht aufgrund eines \"Use-after-free\" Fehlers in \"TLSWrap\". Ein entfernter anonymer Angreifer kann diesen ausnutzen, um Speicher zu besch\u00e4digen und einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T013312", "T026522", "T012167", "T004914" ] }, "release_date": "2021-01-04T23:00:00Z", "title": "CVE-2020-8265" }, { "cve": "CVE-2020-8287", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie besteht aufgrund einer unsachgem\u00e4\u00dfen Validierung von HTTP-Requests, die zwei Kopien eines Header-Feldes zul\u00e4sst. Ein entfernter anonymer Angreifer kann manipulierte HTTP-Anfragen senden und beliebige HTTP-Header einschleusen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T013312", "T026522", "T012167", "T004914" ] }, "release_date": "2021-01-04T23:00:00Z", "title": "CVE-2020-8287" } ] }
gsd-2020-8287
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-8287", "description": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", "id": "GSD-2020-8287", "references": [ "https://www.suse.com/security/cve/CVE-2020-8287.html", "https://www.debian.org/security/2021/dsa-4826", "https://access.redhat.com/errata/RHSA-2021:0551", "https://access.redhat.com/errata/RHSA-2021:0549", "https://access.redhat.com/errata/RHSA-2021:0548", "https://access.redhat.com/errata/RHSA-2021:0521", "https://access.redhat.com/errata/RHSA-2021:0485", "https://access.redhat.com/errata/RHSA-2021:0421", "https://advisories.mageia.org/CVE-2020-8287.html", "https://security.archlinux.org/CVE-2020-8287", "https://linux.oracle.com/cve/CVE-2020-8287.html", "https://ubuntu.com/security/CVE-2020-8287" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-8287" ], "details": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", "id": "GSD-2020-8287", "modified": "2023-12-13T01:21:53.423870Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8287", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/nodejs/node", "version": { "version_data": [ { "version_value": "Fixed in 10.23.1, 12.20.1, 14.15.4, 15.5.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "HTTP Request Smuggling (CWE-444)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1002188", "refsource": "MISC", "url": "https://hackerone.com/reports/1002188" }, { "name": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/", "refsource": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "name": "DSA-4826", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4826" }, { "name": "FEDORA-2021-fb1a136393", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "name": "GLSA-202101-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "name": "FEDORA-2021-d5b2c18fe6", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210212-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3224-1] http-parser security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "15.5.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "14.15.4", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "12.20.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "10.23.1", "versionStartIncluding": "10.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:19.3.4:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:20.3.0:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve-assignments@hackerone.com", "ID": "CVE-2020-8287" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-444" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1002188", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1002188" }, { "name": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "name": "DSA-4826", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4826" }, { "name": "FEDORA-2021-fb1a136393", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "name": "GLSA-202101-07", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-07" }, { "name": "FEDORA-2021-d5b2c18fe6", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210212-0003/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3224-1] http-parser security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5 } }, "lastModifiedDate": "2023-02-03T19:12Z", "publishedDate": "2021-01-06T21:15Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.